Maryam Monshipouri
Examiner (ID: 15138, Phone: (571)272-0932 , Office: P/1656 )
Most Active Art Unit | 1656 |
Art Unit(s) | 1651, 1652, 1653, 1656 |
Total Applications | 2082 |
Issued Applications | 1472 |
Pending Applications | 203 |
Abandoned Applications | 361 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 6191395
[patent_doc_number] => 20110173679
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-07-14
[patent_title] => 'RESOURCE ACCESS BASED ON MULTIPLE SCOPE LEVELS'
[patent_app_type] => utility
[patent_app_number] => 12/684426
[patent_app_country] => US
[patent_app_date] => 2010-01-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5117
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0173/20110173679.pdf
[firstpage_image] =>[orig_patent_app_number] => 12684426
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/684426 | Resource access based on multiple scope levels | Jan 7, 2010 | Issued |
Array
(
[id] => 6522166
[patent_doc_number] => 20100211663
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-19
[patent_title] => 'MANAGEMENT OF POOL MEMBER CONFIGURATION'
[patent_app_type] => utility
[patent_app_number] => 12/684727
[patent_app_country] => US
[patent_app_date] => 2010-01-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11734
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0211/20100211663.pdf
[firstpage_image] =>[orig_patent_app_number] => 12684727
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/684727 | MANAGEMENT OF POOL MEMBER CONFIGURATION | Jan 7, 2010 | Abandoned |
Array
(
[id] => 8946164
[patent_doc_number] => 08499351
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-07-30
[patent_title] => 'Isolated security monitoring system'
[patent_app_type] => utility
[patent_app_number] => 12/641092
[patent_app_country] => US
[patent_app_date] => 2009-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 9124
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12641092
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/641092 | Isolated security monitoring system | Dec 16, 2009 | Issued |
Array
(
[id] => 8343092
[patent_doc_number] => 08245030
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-08-14
[patent_title] => 'Method for authenticating online transactions using a browser'
[patent_app_type] => utility
[patent_app_number] => 12/641156
[patent_app_country] => US
[patent_app_date] => 2009-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4336
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12641156
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/641156 | Method for authenticating online transactions using a browser | Dec 16, 2009 | Issued |
Array
(
[id] => 5976466
[patent_doc_number] => 20110154010
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-23
[patent_title] => 'SECURITY TO EXTEND TRUST'
[patent_app_type] => utility
[patent_app_number] => 12/641029
[patent_app_country] => US
[patent_app_date] => 2009-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7201
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0154/20110154010.pdf
[firstpage_image] =>[orig_patent_app_number] => 12641029
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/641029 | Security to extend trust | Dec 16, 2009 | Issued |
Array
(
[id] => 6241661
[patent_doc_number] => 20100269156
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-10-21
[patent_title] => 'APPARATUS AND METHODS FOR PROVIDING AUTHORIZED DEVICE ACCESS'
[patent_app_type] => utility
[patent_app_number] => 12/641305
[patent_app_country] => US
[patent_app_date] => 2009-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 19469
[patent_no_of_claims] => 66
[patent_no_of_ind_claims] => 20
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0269/20100269156.pdf
[firstpage_image] =>[orig_patent_app_number] => 12641305
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/641305 | Apparatus and methods for providing authorized device access | Dec 16, 2009 | Issued |
Array
(
[id] => 8208067
[patent_doc_number] => 08190879
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-05-29
[patent_title] => 'Graceful conversion of a security to a non-security transparent proxy'
[patent_app_type] => utility
[patent_app_number] => 12/641077
[patent_app_country] => US
[patent_app_date] => 2009-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 4910
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 199
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/190/08190879.pdf
[firstpage_image] =>[orig_patent_app_number] => 12641077
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/641077 | Graceful conversion of a security to a non-security transparent proxy | Dec 16, 2009 | Issued |
Array
(
[id] => 7694656
[patent_doc_number] => 20110231934
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-22
[patent_title] => 'Distributed Virus Detection'
[patent_app_type] => utility
[patent_app_number] => 13/131006
[patent_app_country] => US
[patent_app_date] => 2009-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2592
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0231/20110231934.pdf
[firstpage_image] =>[orig_patent_app_number] => 13131006
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/131006 | Distributed Virus Detection | Nov 23, 2009 | Abandoned |
Array
(
[id] => 6054165
[patent_doc_number] => 20110110525
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-12
[patent_title] => 'Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus'
[patent_app_type] => utility
[patent_app_number] => 12/590584
[patent_app_country] => US
[patent_app_date] => 2009-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 19338
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0110/20110110525.pdf
[firstpage_image] =>[orig_patent_app_number] => 12590584
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/590584 | Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus | Nov 9, 2009 | Issued |
Array
(
[id] => 8959310
[patent_doc_number] => 08505104
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-06
[patent_title] => 'Apparatus and method for recording and reproducing images'
[patent_app_type] => utility
[patent_app_number] => 12/614882
[patent_app_country] => US
[patent_app_date] => 2009-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 5096
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12614882
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/614882 | Apparatus and method for recording and reproducing images | Nov 8, 2009 | Issued |
Array
(
[id] => 6057891
[patent_doc_number] => 20110113489
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-12
[patent_title] => 'SYSTEM AND METHOD FOR MITIGATING A DENIAL OF SERVICE ATTACK IN A SUBSCRIBER NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/614820
[patent_app_country] => US
[patent_app_date] => 2009-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3846
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0113/20110113489.pdf
[firstpage_image] =>[orig_patent_app_number] => 12614820
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/614820 | System and method for mitigating a denial of service attack in a subscriber network | Nov 8, 2009 | Issued |
Array
(
[id] => 7684061
[patent_doc_number] => 20100122080
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-05-13
[patent_title] => 'PSEUDONYM CERTIFICATE PROCESS SYSTEM BY SPLITTING AUTHORITY'
[patent_app_type] => utility
[patent_app_number] => 12/614961
[patent_app_country] => US
[patent_app_date] => 2009-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2936
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0122/20100122080.pdf
[firstpage_image] =>[orig_patent_app_number] => 12614961
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/614961 | PSEUDONYM CERTIFICATE PROCESS SYSTEM BY SPLITTING AUTHORITY | Nov 8, 2009 | Abandoned |
Array
(
[id] => 8805165
[patent_doc_number] => 08443449
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-05-14
[patent_title] => 'Silent detection of malware and feedback over a network'
[patent_app_type] => utility
[patent_app_number] => 12/614879
[patent_app_country] => US
[patent_app_date] => 2009-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 13
[patent_no_of_words] => 5801
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12614879
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/614879 | Silent detection of malware and feedback over a network | Nov 8, 2009 | Issued |
Array
(
[id] => 7684055
[patent_doc_number] => 20100122086
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-05-13
[patent_title] => 'METHOD FOR COMBINING DATA TO BE PROCESSED WITH A DATA-SPECIFIC APPARATUS, AND APPARATUS AND COMPUTER PROGRAM FOR IMPLEMENTING THE METHOD'
[patent_app_type] => utility
[patent_app_number] => 12/614783
[patent_app_country] => US
[patent_app_date] => 2009-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4853
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0122/20100122086.pdf
[firstpage_image] =>[orig_patent_app_number] => 12614783
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/614783 | Method for combining data to be processed with a data-specific apparatus, and apparatus and computer program for implementing the method | Nov 8, 2009 | Issued |
Array
(
[id] => 6057393
[patent_doc_number] => 20110113238
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-12
[patent_title] => 'CERTIFICATE ENROLLMENT WITH PURCHASE TO LIMIT SYBIL ATTACKS IN PEER-TO-PEER NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/614671
[patent_app_country] => US
[patent_app_date] => 2009-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5491
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0113/20110113238.pdf
[firstpage_image] =>[orig_patent_app_number] => 12614671
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/614671 | Certificate enrollment with purchase to limit sybil attacks in peer-to-peer network | Nov 8, 2009 | Issued |
Array
(
[id] => 9043828
[patent_doc_number] => 20130246466
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-19
[patent_title] => 'SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TRACKING THE MIGRATION OF OBJECTS TO DETERMINE WHETHER TO PERFORM A NETWORK BASED CHECK'
[patent_app_type] => utility
[patent_app_number] => 12/565541
[patent_app_country] => US
[patent_app_date] => 2009-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3325
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12565541
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/565541 | System, method, and computer program product for tracking the migration of objects to determine whether to perform a network based check | Sep 22, 2009 | Issued |
Array
(
[id] => 6388141
[patent_doc_number] => 20100082986
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-01
[patent_title] => 'CERTIFICATE-BASED ENCRYPTION AND PUBLIC KEY INFRASTRUCTURE'
[patent_app_type] => utility
[patent_app_number] => 12/552720
[patent_app_country] => US
[patent_app_date] => 2009-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 17694
[patent_no_of_claims] => 96
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0082/20100082986.pdf
[firstpage_image] =>[orig_patent_app_number] => 12552720
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/552720 | Certificate-based encryption and public key infrastructure | Sep 1, 2009 | Issued |
Array
(
[id] => 6032516
[patent_doc_number] => 20110055890
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-03
[patent_title] => 'METHOD AND SYSTEM TO CONFIGURE SECURITY RIGHTS BASED ON CONTEXTUAL INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 12/546710
[patent_app_country] => US
[patent_app_date] => 2009-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2744
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0055/20110055890.pdf
[firstpage_image] =>[orig_patent_app_number] => 12546710
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/546710 | METHOD AND SYSTEM TO CONFIGURE SECURITY RIGHTS BASED ON CONTEXTUAL INFORMATION | Aug 24, 2009 | Abandoned |
Array
(
[id] => 6153688
[patent_doc_number] => 20110022841
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-27
[patent_title] => 'AUTHENTICATION SYSTEMS AND METHODS USING A PACKET TELEPHONY DEVICE'
[patent_app_type] => utility
[patent_app_number] => 12/509589
[patent_app_country] => US
[patent_app_date] => 2009-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 6791
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0022/20110022841.pdf
[firstpage_image] =>[orig_patent_app_number] => 12509589
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/509589 | Authentication systems and methods using a packet telephony device | Jul 26, 2009 | Issued |
Array
(
[id] => 8645630
[patent_doc_number] => 08370628
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-02-05
[patent_title] => 'Document collaboration system with alternative views'
[patent_app_type] => utility
[patent_app_number] => 12/503986
[patent_app_country] => US
[patent_app_date] => 2009-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2470
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12503986
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/503986 | Document collaboration system with alternative views | Jul 15, 2009 | Issued |