Search

Maryam Monshipouri

Examiner (ID: 15138, Phone: (571)272-0932 , Office: P/1656 )

Most Active Art Unit
1656
Art Unit(s)
1651, 1652, 1653, 1656
Total Applications
2082
Issued Applications
1472
Pending Applications
203
Abandoned Applications
361

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 6191395 [patent_doc_number] => 20110173679 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-07-14 [patent_title] => 'RESOURCE ACCESS BASED ON MULTIPLE SCOPE LEVELS' [patent_app_type] => utility [patent_app_number] => 12/684426 [patent_app_country] => US [patent_app_date] => 2010-01-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5117 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0173/20110173679.pdf [firstpage_image] =>[orig_patent_app_number] => 12684426 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/684426
Resource access based on multiple scope levels Jan 7, 2010 Issued
Array ( [id] => 6522166 [patent_doc_number] => 20100211663 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-08-19 [patent_title] => 'MANAGEMENT OF POOL MEMBER CONFIGURATION' [patent_app_type] => utility [patent_app_number] => 12/684727 [patent_app_country] => US [patent_app_date] => 2010-01-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 11734 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0211/20100211663.pdf [firstpage_image] =>[orig_patent_app_number] => 12684727 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/684727
MANAGEMENT OF POOL MEMBER CONFIGURATION Jan 7, 2010 Abandoned
Array ( [id] => 8946164 [patent_doc_number] => 08499351 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-07-30 [patent_title] => 'Isolated security monitoring system' [patent_app_type] => utility [patent_app_number] => 12/641092 [patent_app_country] => US [patent_app_date] => 2009-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 10 [patent_no_of_words] => 9124 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 142 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12641092 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/641092
Isolated security monitoring system Dec 16, 2009 Issued
Array ( [id] => 8343092 [patent_doc_number] => 08245030 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-08-14 [patent_title] => 'Method for authenticating online transactions using a browser' [patent_app_type] => utility [patent_app_number] => 12/641156 [patent_app_country] => US [patent_app_date] => 2009-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4336 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 230 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12641156 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/641156
Method for authenticating online transactions using a browser Dec 16, 2009 Issued
Array ( [id] => 5976466 [patent_doc_number] => 20110154010 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-06-23 [patent_title] => 'SECURITY TO EXTEND TRUST' [patent_app_type] => utility [patent_app_number] => 12/641029 [patent_app_country] => US [patent_app_date] => 2009-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7201 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0154/20110154010.pdf [firstpage_image] =>[orig_patent_app_number] => 12641029 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/641029
Security to extend trust Dec 16, 2009 Issued
Array ( [id] => 6241661 [patent_doc_number] => 20100269156 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-10-21 [patent_title] => 'APPARATUS AND METHODS FOR PROVIDING AUTHORIZED DEVICE ACCESS' [patent_app_type] => utility [patent_app_number] => 12/641305 [patent_app_country] => US [patent_app_date] => 2009-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 19469 [patent_no_of_claims] => 66 [patent_no_of_ind_claims] => 20 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0269/20100269156.pdf [firstpage_image] =>[orig_patent_app_number] => 12641305 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/641305
Apparatus and methods for providing authorized device access Dec 16, 2009 Issued
Array ( [id] => 8208067 [patent_doc_number] => 08190879 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-05-29 [patent_title] => 'Graceful conversion of a security to a non-security transparent proxy' [patent_app_type] => utility [patent_app_number] => 12/641077 [patent_app_country] => US [patent_app_date] => 2009-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 4910 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 199 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/190/08190879.pdf [firstpage_image] =>[orig_patent_app_number] => 12641077 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/641077
Graceful conversion of a security to a non-security transparent proxy Dec 16, 2009 Issued
Array ( [id] => 7694656 [patent_doc_number] => 20110231934 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-09-22 [patent_title] => 'Distributed Virus Detection' [patent_app_type] => utility [patent_app_number] => 13/131006 [patent_app_country] => US [patent_app_date] => 2009-11-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 2592 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0231/20110231934.pdf [firstpage_image] =>[orig_patent_app_number] => 13131006 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/131006
Distributed Virus Detection Nov 23, 2009 Abandoned
Array ( [id] => 6054165 [patent_doc_number] => 20110110525 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-12 [patent_title] => 'Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus' [patent_app_type] => utility [patent_app_number] => 12/590584 [patent_app_country] => US [patent_app_date] => 2009-11-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 19338 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0110/20110110525.pdf [firstpage_image] =>[orig_patent_app_number] => 12590584 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/590584
Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus Nov 9, 2009 Issued
Array ( [id] => 8959310 [patent_doc_number] => 08505104 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-08-06 [patent_title] => 'Apparatus and method for recording and reproducing images' [patent_app_type] => utility [patent_app_number] => 12/614882 [patent_app_country] => US [patent_app_date] => 2009-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 5096 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12614882 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/614882
Apparatus and method for recording and reproducing images Nov 8, 2009 Issued
Array ( [id] => 6057891 [patent_doc_number] => 20110113489 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-12 [patent_title] => 'SYSTEM AND METHOD FOR MITIGATING A DENIAL OF SERVICE ATTACK IN A SUBSCRIBER NETWORK' [patent_app_type] => utility [patent_app_number] => 12/614820 [patent_app_country] => US [patent_app_date] => 2009-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3846 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0113/20110113489.pdf [firstpage_image] =>[orig_patent_app_number] => 12614820 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/614820
System and method for mitigating a denial of service attack in a subscriber network Nov 8, 2009 Issued
Array ( [id] => 7684061 [patent_doc_number] => 20100122080 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-05-13 [patent_title] => 'PSEUDONYM CERTIFICATE PROCESS SYSTEM BY SPLITTING AUTHORITY' [patent_app_type] => utility [patent_app_number] => 12/614961 [patent_app_country] => US [patent_app_date] => 2009-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2936 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0122/20100122080.pdf [firstpage_image] =>[orig_patent_app_number] => 12614961 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/614961
PSEUDONYM CERTIFICATE PROCESS SYSTEM BY SPLITTING AUTHORITY Nov 8, 2009 Abandoned
Array ( [id] => 8805165 [patent_doc_number] => 08443449 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-05-14 [patent_title] => 'Silent detection of malware and feedback over a network' [patent_app_type] => utility [patent_app_number] => 12/614879 [patent_app_country] => US [patent_app_date] => 2009-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 13 [patent_no_of_words] => 5801 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12614879 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/614879
Silent detection of malware and feedback over a network Nov 8, 2009 Issued
Array ( [id] => 7684055 [patent_doc_number] => 20100122086 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-05-13 [patent_title] => 'METHOD FOR COMBINING DATA TO BE PROCESSED WITH A DATA-SPECIFIC APPARATUS, AND APPARATUS AND COMPUTER PROGRAM FOR IMPLEMENTING THE METHOD' [patent_app_type] => utility [patent_app_number] => 12/614783 [patent_app_country] => US [patent_app_date] => 2009-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4853 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0122/20100122086.pdf [firstpage_image] =>[orig_patent_app_number] => 12614783 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/614783
Method for combining data to be processed with a data-specific apparatus, and apparatus and computer program for implementing the method Nov 8, 2009 Issued
Array ( [id] => 6057393 [patent_doc_number] => 20110113238 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-12 [patent_title] => 'CERTIFICATE ENROLLMENT WITH PURCHASE TO LIMIT SYBIL ATTACKS IN PEER-TO-PEER NETWORK' [patent_app_type] => utility [patent_app_number] => 12/614671 [patent_app_country] => US [patent_app_date] => 2009-11-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5491 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0113/20110113238.pdf [firstpage_image] =>[orig_patent_app_number] => 12614671 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/614671
Certificate enrollment with purchase to limit sybil attacks in peer-to-peer network Nov 8, 2009 Issued
Array ( [id] => 9043828 [patent_doc_number] => 20130246466 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-09-19 [patent_title] => 'SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TRACKING THE MIGRATION OF OBJECTS TO DETERMINE WHETHER TO PERFORM A NETWORK BASED CHECK' [patent_app_type] => utility [patent_app_number] => 12/565541 [patent_app_country] => US [patent_app_date] => 2009-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3325 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12565541 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/565541
System, method, and computer program product for tracking the migration of objects to determine whether to perform a network based check Sep 22, 2009 Issued
Array ( [id] => 6388141 [patent_doc_number] => 20100082986 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-04-01 [patent_title] => 'CERTIFICATE-BASED ENCRYPTION AND PUBLIC KEY INFRASTRUCTURE' [patent_app_type] => utility [patent_app_number] => 12/552720 [patent_app_country] => US [patent_app_date] => 2009-09-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 17694 [patent_no_of_claims] => 96 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0082/20100082986.pdf [firstpage_image] =>[orig_patent_app_number] => 12552720 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/552720
Certificate-based encryption and public key infrastructure Sep 1, 2009 Issued
Array ( [id] => 6032516 [patent_doc_number] => 20110055890 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-03 [patent_title] => 'METHOD AND SYSTEM TO CONFIGURE SECURITY RIGHTS BASED ON CONTEXTUAL INFORMATION' [patent_app_type] => utility [patent_app_number] => 12/546710 [patent_app_country] => US [patent_app_date] => 2009-08-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 2744 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0055/20110055890.pdf [firstpage_image] =>[orig_patent_app_number] => 12546710 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/546710
METHOD AND SYSTEM TO CONFIGURE SECURITY RIGHTS BASED ON CONTEXTUAL INFORMATION Aug 24, 2009 Abandoned
Array ( [id] => 6153688 [patent_doc_number] => 20110022841 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-27 [patent_title] => 'AUTHENTICATION SYSTEMS AND METHODS USING A PACKET TELEPHONY DEVICE' [patent_app_type] => utility [patent_app_number] => 12/509589 [patent_app_country] => US [patent_app_date] => 2009-07-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 6791 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0022/20110022841.pdf [firstpage_image] =>[orig_patent_app_number] => 12509589 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/509589
Authentication systems and methods using a packet telephony device Jul 26, 2009 Issued
Array ( [id] => 8645630 [patent_doc_number] => 08370628 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-02-05 [patent_title] => 'Document collaboration system with alternative views' [patent_app_type] => utility [patent_app_number] => 12/503986 [patent_app_country] => US [patent_app_date] => 2009-07-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2470 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 231 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12503986 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/503986
Document collaboration system with alternative views Jul 15, 2009 Issued
Menu