Login with your work email address to view charts. No credit card required.
| Art Unit: | 2499 — Information security |
|---|---|
| Group: | 2400a-2430-2490 — Cryptography and Security |
| Classes: |
726 — Information security 713 — Electrical computers and digital processing systems: support 380 — Cryptography |
| Phone: | (571) 272-8118 |
| Email: | None |
| Location: | None |
| Title: | Pat Examnr Compr Engrg |
| Service: | 3 years |
| Grade: | GS-09 |
Below is the grant rate timeline for Examiner Maazouz, where the timeline is relative to the date of the first office action. The three-year grant rate is the percentage of applications granted at three years after the first office action.
Examiner Maazouz's grant rate is lower than that of Art Unit 2499 and lower than that of the USPTO.
| Average Office Actions Per Grant | |
|---|---|
| Examiner Maazouz | 2.2 |
| Art Unit 2499 | 1.3 |
Examiner Maazouz has granted 1 of 2 cases without any applicant-requested interviews for a grant rate of 50%.
Examiner Maazouz has granted 1 of 1 cases with at least one applicant-requested interview for a grant rate of 100%.
With Examiner Maazouz, conducting an interview increases your chance of getting a patent granted by 100%.
| Number | Title | OA Rejections | Status | IFW |
|---|---|---|---|---|
| 17991756 | Generating A Content Signature Of A Textual Communication Using Optical Character Recognition And Text Processing | Rejection information available with a Premium Stats subscription. See our pricing. | Patented | View |
| 17308754 | Secure Health Management System | Abandoned | View | |
| 17990218 | Secure Caching Of Namespace Keys | Patented | View | |
| 17679814 | Protecting Organizations Using Hierarchical Firewalls | Abandoned | View | |
| 17201175 | Systems And Methods For Scaled User Authentication In Modern Workspaces | Abandoned | View | |
| 17555043 | Apparatus And Method For Kernel Runtime Randomization | Patented | View | |
| 17649629 | Public Key Infrastructure Based Session Authentication | Patented | View | |
| 17485209 | Monitor Integrity Of Endpoints Having Secure Memory Devices For Identity Authentication | Patented | View | |
| 18007629 | Backdoor Inspection Device, Backdoor Inspection Method, And Computer-Readablemedium | Abandoned | View | |
| 17490291 | Systems And Methods For Predicting And Identifying Malicious Events Using Event Sequences For Enhanced Network And Data Security | Abandoned | View | |
| 18056690 | Systems And Methods For Validating Network Operations Between User Accounts Through Access Tokens | Patented | View | |
| 17990154 | Information Processing Apparatus That Registers Function Information Along With User Information, When Reregistering User Information Once Deleted | Abandoned | View | |
| 17884674 | Resource Policy Adjustment Based On Data Characterization | Abandoned | View | |
| 17091355 | Patching Security Vulnerabilities Using Machine Learning | Patented | View | |
| 18056517 | Method And Apparatus For Finding Hidden Ip Address In Malicious Site Using Dns Service | Patented | View | |
| 17258143 | Connected Synthetic Physically Unclonable Function | Patented | View | |
| 17422290 | Methods, Network Node And Wireless Device For Verification Of Broadcast Messages | Patented | View | |
| 17485007 | Techniques For Secure Data Transmission Using User And Secondary Devices | Abandoned | View | |
| 17545806 | Multi-Level Authentication Security Service | Patented | View | |
| 17459298 | Proactive Identification Of Potential Security Threats On Residential Gateway Devices | Patented | View | |
| 18047579 | Improved Confidential Computing | Abandoned | View | |
| 17430507 | Information Processing Apparatus, Secure Computation Method, And Program | Abandoned | View | |
| 17277379 | Information Processing Device, Control Method, And Program | Abandoned | View | |
| 17514458 | Tic Detection-Based Video Authentication Method And System | Patented | View | |
| 17686192 | Unmanned Driving Information Storage And Playback Method, Device And Storage Medium | Patented | View | |
| 17495342 | Hsm-Memory-Efficient Means Of Providing Hsm-Based Pki Operations For Vehicle Controllers | Patented | View | |
| 17818803 | System For Tracking Patient Referrals | Abandoned | View | |
| 17424036 | Utilization Management System, Management Device, Utilization Control Device, Utilization Management Method, And Computer-Readable Program | Patented | View | |
| 17242245 | Multi-Factor Authentication | Patented | View | |
| 17396229 | Tracking And Mitigating Security Threats And Vulnerabilities In Browser Extension Engines | Patented | View | |
| 17297540 | Optical Communication Apparatus, Optical Communication System And Method | Abandoned | View | |
| 17474058 | Method For Providing Message Hidden Services In Chatting Windows | Abandoned | View | |
| 17481156 | Transparent Data Encryption | Patented | View |
Subscribe to Premium Examiner Statistics for unlimited access for your law firm.
Disclaimer: We do not provide any guarantees as to the accuracy of the statistics presented above and under
no circumstances will we be liable for any outcome resulting from your reliance on the above statistics.