
Mounir Moutaouakil
Examiner (ID: 18675, Phone: (571)270-1416 , Office: P/2476 )
| Most Active Art Unit | 2476 |
| Art Unit(s) | 2619, 2616, 2419, 2476 |
| Total Applications | 872 |
| Issued Applications | 682 |
| Pending Applications | 71 |
| Abandoned Applications | 134 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17952077
[patent_doc_number] => 11478148
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-25
[patent_title] => Method and apparatus for automatically integrating a medical device into a medical facility network
[patent_app_type] => utility
[patent_app_number] => 17/147271
[patent_app_country] => US
[patent_app_date] => 2021-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4730
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17147271
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/147271 | Method and apparatus for automatically integrating a medical device into a medical facility network | Jan 11, 2021 | Issued |
Array
(
[id] => 18343879
[patent_doc_number] => 11641366
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-05-02
[patent_title] => Centralized tool for identifying and blocking malicious communications transmitted within a network
[patent_app_type] => utility
[patent_app_number] => 17/146084
[patent_app_country] => US
[patent_app_date] => 2021-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10407
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 334
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17146084
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/146084 | Centralized tool for identifying and blocking malicious communications transmitted within a network | Jan 10, 2021 | Issued |
Array
(
[id] => 17736892
[patent_doc_number] => 20220222351
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-14
[patent_title] => SYSTEM AND METHOD FOR SELECTION AND DISCOVERY OF VULNERABLE SOFTWARE PACKAGES
[patent_app_type] => utility
[patent_app_number] => 17/145893
[patent_app_country] => US
[patent_app_date] => 2021-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5384
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17145893
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/145893 | SYSTEM AND METHOD FOR SELECTION AND DISCOVERY OF VULNERABLE SOFTWARE PACKAGES | Jan 10, 2021 | Abandoned |
Array
(
[id] => 18976205
[patent_doc_number] => 20240056297
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-02-15
[patent_title] => ESTABLISHING TRUST BY A COMMUNITY OF VEHICLES
[patent_app_type] => utility
[patent_app_number] => 18/260702
[patent_app_country] => US
[patent_app_date] => 2021-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11685
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18260702
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/260702 | ESTABLISHING TRUST BY A COMMUNITY OF VEHICLES | Jan 6, 2021 | Pending |
Array
(
[id] => 16782921
[patent_doc_number] => 20210120000
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-22
[patent_title] => CONTROLLING ACCESS TO NETWORKS IN A HETEROGENEOUS NETWORK ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 17/136426
[patent_app_country] => US
[patent_app_date] => 2020-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9849
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17136426
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/136426 | Controlling access to networks in a heterogeneous network environment | Dec 28, 2020 | Issued |
Array
(
[id] => 18262285
[patent_doc_number] => 11609987
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-03-21
[patent_title] => Advanced file modification heuristics
[patent_app_type] => utility
[patent_app_number] => 17/119707
[patent_app_country] => US
[patent_app_date] => 2020-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6246
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17119707
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/119707 | Advanced file modification heuristics | Dec 10, 2020 | Issued |
Array
(
[id] => 17320329
[patent_doc_number] => 20210409379
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-30
[patent_title] => METHOD OF SHARING AND USING SENSOR DATA
[patent_app_type] => utility
[patent_app_number] => 17/118358
[patent_app_country] => US
[patent_app_date] => 2020-12-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 56859
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17118358
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/118358 | Method of sharing and using sensor data | Dec 9, 2020 | Issued |
Array
(
[id] => 18416869
[patent_doc_number] => 11671420
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-06-06
[patent_title] => Certification system
[patent_app_type] => utility
[patent_app_number] => 17/098389
[patent_app_country] => US
[patent_app_date] => 2020-11-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 6729
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17098389
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/098389 | Certification system | Nov 14, 2020 | Issued |
Array
(
[id] => 18494842
[patent_doc_number] => 11700267
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-11
[patent_title] => Threat intelligence system
[patent_app_type] => utility
[patent_app_number] => 17/090892
[patent_app_country] => US
[patent_app_date] => 2020-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8951
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17090892
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/090892 | Threat intelligence system | Nov 5, 2020 | Issued |
Array
(
[id] => 19475754
[patent_doc_number] => 12105845
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-10-01
[patent_title] => System and method for entity resolution of a data element
[patent_app_type] => utility
[patent_app_number] => 17/090943
[patent_app_country] => US
[patent_app_date] => 2020-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8599
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 600
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17090943
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/090943 | System and method for entity resolution of a data element | Nov 5, 2020 | Issued |
Array
(
[id] => 18007260
[patent_doc_number] => 20220366026
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-11-17
[patent_title] => Using Multi-Factor Authentication as a Labeler for Machine Learning- Based Authentication
[patent_app_type] => utility
[patent_app_number] => 17/767040
[patent_app_country] => US
[patent_app_date] => 2020-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2886
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17767040
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/767040 | Using Multi-Factor Authentication as a Labeler for Machine Learning- Based Authentication | Oct 18, 2020 | Abandoned |
Array
(
[id] => 16766294
[patent_doc_number] => 20210111876
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-15
[patent_title] => SECURE SESSION FOR DECRYPTION
[patent_app_type] => utility
[patent_app_number] => 17/066512
[patent_app_country] => US
[patent_app_date] => 2020-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12540
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17066512
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/066512 | SECURE SESSION FOR DECRYPTION | Oct 8, 2020 | Abandoned |
Array
(
[id] => 16950539
[patent_doc_number] => 20210209231
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-08
[patent_title] => PASSIVE MONITORING AND PREVENTION OF UNAUTHORIZED FIRMWARE OR SOFTWARE UPGRADES BETWEEN COMPUTING DEVICES
[patent_app_type] => utility
[patent_app_number] => 17/029175
[patent_app_country] => US
[patent_app_date] => 2020-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7869
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17029175
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/029175 | Passive monitoring and prevention of unauthorized firmware or software upgrades between computing devices | Sep 22, 2020 | Issued |
Array
(
[id] => 16722514
[patent_doc_number] => 20210089661
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-25
[patent_title] => Anomaly Detection for Cyber-Physical Systems
[patent_app_type] => utility
[patent_app_number] => 17/027463
[patent_app_country] => US
[patent_app_date] => 2020-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 29397
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 92
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17027463
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/027463 | Anomaly detection for cyber-physical systems | Sep 20, 2020 | Issued |
Array
(
[id] => 16716873
[patent_doc_number] => 20210084020
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-18
[patent_title] => SYSTEM AND METHOD FOR IDENTITY AND AUTHORIZATION MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 17/024053
[patent_app_country] => US
[patent_app_date] => 2020-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7959
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17024053
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/024053 | SYSTEM AND METHOD FOR IDENTITY AND AUTHORIZATION MANAGEMENT | Sep 16, 2020 | Abandoned |
Array
(
[id] => 17476163
[patent_doc_number] => 20220083667
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-17
[patent_title] => Open Source Software Security Vulnerability Prioritization Scheme
[patent_app_type] => utility
[patent_app_number] => 17/022210
[patent_app_country] => US
[patent_app_date] => 2020-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12352
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 79
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17022210
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/022210 | Open Source Software Security Vulnerability Prioritization Scheme | Sep 15, 2020 | Abandoned |
Array
(
[id] => 18388170
[patent_doc_number] => 11658970
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-05-23
[patent_title] => Computing device infrastructure trust domain system
[patent_app_type] => utility
[patent_app_number] => 17/019523
[patent_app_country] => US
[patent_app_date] => 2020-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 10608
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17019523
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/019523 | Computing device infrastructure trust domain system | Sep 13, 2020 | Issued |
Array
(
[id] => 19905535
[patent_doc_number] => 12282540
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2025-04-22
[patent_title] => Verifying software for isolated runtime environments using emulated security devices
[patent_app_type] => utility
[patent_app_number] => 17/020642
[patent_app_country] => US
[patent_app_date] => 2020-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12457
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17020642
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/020642 | Verifying software for isolated runtime environments using emulated security devices | Sep 13, 2020 | Issued |
Array
(
[id] => 16546195
[patent_doc_number] => 20200412610
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-31
[patent_title] => DEPLOYMENT OF NETWORK-RELATED FEATURES OVER CLOUD NETWORK
[patent_app_type] => utility
[patent_app_number] => 17/017555
[patent_app_country] => US
[patent_app_date] => 2020-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 25878
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17017555
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/017555 | Deployment of network-related features over cloud network | Sep 9, 2020 | Issued |
Array
(
[id] => 18079772
[patent_doc_number] => 20220405384
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-12-22
[patent_title] => BLOCKCHAIN-BASED METHOD AND SYSTEM FOR SECURING A NETWORK OF VIRTUAL WIRELESS BASE STATIONS
[patent_app_type] => utility
[patent_app_number] => 17/638505
[patent_app_country] => US
[patent_app_date] => 2020-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12472
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17638505
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/638505 | BLOCKCHAIN-BASED METHOD AND SYSTEM FOR SECURING A NETWORK OF VIRTUAL WIRELESS BASE STATIONS | Aug 27, 2020 | Pending |