
Muhammad N. Edun
Examiner (ID: 6164, Phone: (571)272-7617 , Office: P/2687 )
| Most Active Art Unit | 2687 |
| Art Unit(s) | 2629, 2516, 2753, 2651, 2655, 2686, 2687, 2656, 2627, 2653, 2513, 2305 |
| Total Applications | 3461 |
| Issued Applications | 3149 |
| Pending Applications | 90 |
| Abandoned Applications | 252 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13801151
[patent_doc_number] => 20190014114
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-10
[patent_title] => AUTHENTICATION OF DATA TRANSMISSION DEVICES
[patent_app_type] => utility
[patent_app_number] => 16/067203
[patent_app_country] => US
[patent_app_date] => 2017-01-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5838
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16067203
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/067203 | Authentication of data transmission devices | Jan 4, 2017 | Issued |
Array
(
[id] => 14678871
[patent_doc_number] => 20190238550
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => PERMISSION CONTROL METHOD, APPARATUS AND SYSTEM FOR BLOCK CHAIN, AND NODE DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/316951
[patent_app_country] => US
[patent_app_date] => 2016-12-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6993
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16316951
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/316951 | PERMISSION CONTROL METHOD, APPARATUS AND SYSTEM FOR BLOCK CHAIN, AND NODE DEVICE | Dec 25, 2016 | Abandoned |
Array
(
[id] => 12203412
[patent_doc_number] => 09906495
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-27
[patent_title] => 'Network device implementing two-stage flow information aggregation'
[patent_app_type] => utility
[patent_app_number] => 15/356155
[patent_app_country] => US
[patent_app_date] => 2016-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7507
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 394
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15356155
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/356155 | Network device implementing two-stage flow information aggregation | Nov 17, 2016 | Issued |
Array
(
[id] => 13406725
[patent_doc_number] => 20180254905
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-06
[patent_title] => IOT-BASED THINGS MANAGEMENT SYSTEM AND METHOD USING BLOCK-CHAIN AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 15/559782
[patent_app_country] => US
[patent_app_date] => 2016-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7820
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15559782
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/559782 | IoT-based things management system and method using block-chain authentication | Nov 7, 2016 | Issued |
Array
(
[id] => 14689703
[patent_doc_number] => 20190243967
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-08
[patent_title] => ACTION MONITORING APPARATUS, SYSTEM, AND METHOD
[patent_app_type] => utility
[patent_app_number] => 16/344485
[patent_app_country] => US
[patent_app_date] => 2016-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9130
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16344485
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/344485 | ACTION MONITORING APPARATUS, SYSTEM, AND METHOD | Oct 30, 2016 | Abandoned |
Array
(
[id] => 12599019
[patent_doc_number] => 20180091503
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-29
[patent_title] => NETWORKED STORAGE SYSTEM AND METHOD
[patent_app_type] => utility
[patent_app_number] => 15/277338
[patent_app_country] => US
[patent_app_date] => 2016-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8026
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15277338
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/277338 | NETWORKED STORAGE SYSTEM AND METHOD | Sep 26, 2016 | Abandoned |
Array
(
[id] => 11518502
[patent_doc_number] => 20170085577
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-23
[patent_title] => 'COMPUTER METHOD FOR MAINTAINING A HACK TRAP'
[patent_app_type] => utility
[patent_app_number] => 15/273112
[patent_app_country] => US
[patent_app_date] => 2016-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4461
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15273112
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/273112 | COMPUTER METHOD FOR MAINTAINING A HACK TRAP | Sep 21, 2016 | Abandoned |
Array
(
[id] => 15610023
[patent_doc_number] => 10586077
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-10
[patent_title] => Radio-assisted tamper protection of hardware
[patent_app_type] => utility
[patent_app_number] => 15/271284
[patent_app_country] => US
[patent_app_date] => 2016-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10607
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15271284
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/271284 | Radio-assisted tamper protection of hardware | Sep 20, 2016 | Issued |
Array
(
[id] => 11531484
[patent_doc_number] => 20170091462
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'SOFTWARE DEVELOPMENT SYSTEM IN SYSTEM DEVELOPMENT BASED ON MODEL-BASED METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/272249
[patent_app_country] => US
[patent_app_date] => 2016-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 36
[patent_figures_cnt] => 36
[patent_no_of_words] => 15663
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15272249
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/272249 | SOFTWARE DEVELOPMENT SYSTEM IN SYSTEM DEVELOPMENT BASED ON MODEL-BASED METHOD | Sep 20, 2016 | Abandoned |
Array
(
[id] => 11533877
[patent_doc_number] => 20170093857
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'MANAGEMENT SYSTEM, COMMUNICATION SYSTEM, AND TRANSMISSION CONTROL METHOD'
[patent_app_type] => utility
[patent_app_number] => 15/270457
[patent_app_country] => US
[patent_app_date] => 2016-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 11819
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15270457
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/270457 | MANAGEMENT SYSTEM, COMMUNICATION SYSTEM, AND TRANSMISSION CONTROL METHOD | Sep 19, 2016 | Abandoned |
Array
(
[id] => 11579762
[patent_doc_number] => 09635036
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-25
[patent_title] => 'Managing user authentication in association with application access'
[patent_app_type] => utility
[patent_app_number] => 15/268659
[patent_app_country] => US
[patent_app_date] => 2016-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7979
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 606
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15268659
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/268659 | Managing user authentication in association with application access | Sep 18, 2016 | Issued |
Array
(
[id] => 12358107
[patent_doc_number] => 09954890
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-04-24
[patent_title] => Systems and methods for analyzing PDF documents
[patent_app_type] => utility
[patent_app_number] => 15/256367
[patent_app_country] => US
[patent_app_date] => 2016-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12480
[patent_no_of_claims] => 61
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 133
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15256367
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/256367 | Systems and methods for analyzing PDF documents | Sep 1, 2016 | Issued |
Array
(
[id] => 11579761
[patent_doc_number] => 09635035
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-25
[patent_title] => 'Managing user authentication in association with application access'
[patent_app_type] => utility
[patent_app_number] => 15/251079
[patent_app_country] => US
[patent_app_date] => 2016-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7978
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 609
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15251079
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/251079 | Managing user authentication in association with application access | Aug 29, 2016 | Issued |
Array
(
[id] => 11905176
[patent_doc_number] => 09774626
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-09-26
[patent_title] => 'Method and system for assessing and classifying reported potentially malicious messages in a cybersecurity system'
[patent_app_type] => utility
[patent_app_number] => 15/239668
[patent_app_country] => US
[patent_app_date] => 2016-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9437
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 273
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15239668
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/239668 | Method and system for assessing and classifying reported potentially malicious messages in a cybersecurity system | Aug 16, 2016 | Issued |
Array
(
[id] => 15378135
[patent_doc_number] => 10530803
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-01-07
[patent_title] => Secure online transactions
[patent_app_type] => utility
[patent_app_number] => 15/201727
[patent_app_country] => US
[patent_app_date] => 2016-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4804
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 272
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15201727
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/201727 | Secure online transactions | Jul 4, 2016 | Issued |
Array
(
[id] => 12123240
[patent_doc_number] => 20180006826
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-04
[patent_title] => 'PUBLIC KEY INFRASTRUCTURE USING BLOCKCHAINS'
[patent_app_type] => utility
[patent_app_number] => 15/201219
[patent_app_country] => US
[patent_app_date] => 2016-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10707
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15201219
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/201219 | Public key infrastructure using blockchains | Jun 30, 2016 | Issued |
Array
(
[id] => 11542489
[patent_doc_number] => 20170096315
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-06
[patent_title] => '3D Printer Filament Supply Container Including a Supply Control and Management System'
[patent_app_type] => utility
[patent_app_number] => 15/178603
[patent_app_country] => US
[patent_app_date] => 2016-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3222
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178603
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/178603 | 3D Printer Filament Supply Container Including a Supply Control and Management System | Jun 9, 2016 | Abandoned |
Array
(
[id] => 17804201
[patent_doc_number] => 11418520
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-16
[patent_title] => Passive security analysis with inline active security device
[patent_app_type] => utility
[patent_app_number] => 15/178965
[patent_app_country] => US
[patent_app_date] => 2016-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5552
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178965
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/178965 | Passive security analysis with inline active security device | Jun 9, 2016 | Issued |
Array
(
[id] => 16821010
[patent_doc_number] => 11005863
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-11
[patent_title] => Threat detection and localization for monitoring nodes of an industrial asset control system
[patent_app_type] => utility
[patent_app_number] => 15/179034
[patent_app_country] => US
[patent_app_date] => 2016-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 7279
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15179034
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/179034 | Threat detection and localization for monitoring nodes of an industrial asset control system | Jun 9, 2016 | Issued |
Array
(
[id] => 11095483
[patent_doc_number] => 20160292452
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'METHOD AND SYSTEM FOR EMBEDDING INFORMATION IN COMUPTER DATA'
[patent_app_type] => utility
[patent_app_number] => 15/178466
[patent_app_country] => US
[patent_app_date] => 2016-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 4035
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15178466
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/178466 | METHOD AND SYSTEM FOR EMBEDDING INFORMATION IN COMUPTER DATA | Jun 8, 2016 | Abandoned |