Search

Ali Shayanfar

Examiner (ID: 11667, Phone: (571)270-1050 , Office: P/2497 )

Most Active Art Unit
2497
Art Unit(s)
4100, 2493, 2142, 2439, 2497, 4167, 4164
Total Applications
540
Issued Applications
497
Pending Applications
2
Abandoned Applications
46

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 16217489 [patent_doc_number] => 10733303 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-08-04 [patent_title] => Polymorphic code translation systems and methods [patent_app_type] => utility [patent_app_number] => 16/856928 [patent_app_country] => US [patent_app_date] => 2020-04-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 12 [patent_no_of_words] => 9845 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 586 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16856928 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/856928
Polymorphic code translation systems and methods Apr 22, 2020 Issued
Array ( [id] => 16447150 [patent_doc_number] => 10839079 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-11-17 [patent_title] => Systems and methods for tamper-resistant verification of firmware with a trusted platform module [patent_app_type] => utility [patent_app_number] => 16/735931 [patent_app_country] => US [patent_app_date] => 2020-01-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4881 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16735931 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/735931
Systems and methods for tamper-resistant verification of firmware with a trusted platform module Jan 6, 2020 Issued
Array ( [id] => 16323291 [patent_doc_number] => 10783257 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-09-22 [patent_title] => Use of word embeddings to locate sensitive text in computer programming scripts [patent_app_type] => utility [patent_app_number] => 16/722867 [patent_app_country] => US [patent_app_date] => 2019-12-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 5538 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 177 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16722867 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/722867
Use of word embeddings to locate sensitive text in computer programming scripts Dec 19, 2019 Issued
Array ( [id] => 16449319 [patent_doc_number] => 10841254 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-11-17 [patent_title] => Asymmetric permissions in a communications system [patent_app_type] => utility [patent_app_number] => 16/716844 [patent_app_country] => US [patent_app_date] => 2019-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 5140 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 226 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16716844 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/716844
Asymmetric permissions in a communications system Dec 16, 2019 Issued
Array ( [id] => 15924357 [patent_doc_number] => 10659434 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-05-19 [patent_title] => Application whitelist using a controlled node flow [patent_app_type] => utility [patent_app_number] => 16/667774 [patent_app_country] => US [patent_app_date] => 2019-10-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 33 [patent_figures_cnt] => 34 [patent_no_of_words] => 18002 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 302 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16667774 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/667774
Application whitelist using a controlled node flow Oct 28, 2019 Issued
Array ( [id] => 16419029 [patent_doc_number] => 10826944 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-11-03 [patent_title] => Systems and methods for network security [patent_app_type] => utility [patent_app_number] => 16/586151 [patent_app_country] => US [patent_app_date] => 2019-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 3917 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 168 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16586151 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/586151
Systems and methods for network security Sep 26, 2019 Issued
Array ( [id] => 15186935 [patent_doc_number] => 20190364059 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-11-28 [patent_title] => Identifying command and control endpoint used by domain generation algorithm (DGA) malware [patent_app_type] => utility [patent_app_number] => 16/519029 [patent_app_country] => US [patent_app_date] => 2019-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6370 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16519029 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/519029
Identifying command and control endpoint used by domain generation algorithm (DGA) malware Jul 22, 2019 Issued
Array ( [id] => 16357355 [patent_doc_number] => 10797880 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-10-06 [patent_title] => Access manager [patent_app_type] => utility [patent_app_number] => 16/514833 [patent_app_country] => US [patent_app_date] => 2019-07-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 16 [patent_no_of_words] => 4803 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16514833 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/514833
Access manager Jul 16, 2019 Issued
Array ( [id] => 15125533 [patent_doc_number] => 20190349400 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-11-14 [patent_title] => SYSTEMS AND METHODS OF DETECTING EMAIL-BASED ATTACKS THROUGH MACHINE LEARNING [patent_app_type] => utility [patent_app_number] => 16/507743 [patent_app_country] => US [patent_app_date] => 2019-07-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8741 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 84 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16507743 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/507743
Systems and methods of detecting email-based attacks through machine learning Jul 9, 2019 Issued
Array ( [id] => 15232405 [patent_doc_number] => 10503927 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-12-10 [patent_title] => Method and system for securing cloud storage and databases from insider threats and optimizing performance [patent_app_type] => utility [patent_app_number] => 16/506285 [patent_app_country] => US [patent_app_date] => 2019-07-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 8971 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 106 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16506285 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/506285
Method and system for securing cloud storage and databases from insider threats and optimizing performance Jul 8, 2019 Issued
Array ( [id] => 15353595 [patent_doc_number] => 20200014689 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-09 [patent_title] => USB DEVICE FOR NETWORK SECURITY [patent_app_type] => utility [patent_app_number] => 16/505318 [patent_app_country] => US [patent_app_date] => 2019-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5956 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -4 [patent_words_short_claim] => 263 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16505318 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/505318
USB device for network security Jul 7, 2019 Issued
Array ( [id] => 14941117 [patent_doc_number] => 20190306197 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-10-03 [patent_title] => AUTOMATED SERVICE-ORIENTED PERFORMANCE MANAGEMENT [patent_app_type] => utility [patent_app_number] => 16/443476 [patent_app_country] => US [patent_app_date] => 2019-06-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10837 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 242 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16443476 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/443476
Automated service-oriented performance management Jun 16, 2019 Issued
Array ( [id] => 16387634 [patent_doc_number] => 10812490 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-10-20 [patent_title] => Permissions using blockchain [patent_app_type] => utility [patent_app_number] => 16/432012 [patent_app_country] => US [patent_app_date] => 2019-06-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6496 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 164 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16432012 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/432012
Permissions using blockchain Jun 4, 2019 Issued
Array ( [id] => 14877535 [patent_doc_number] => 20190289009 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-09-19 [patent_title] => CONTROLLING USER CREATION OF DATA RESOURCES ON A DATA PROCESSING PLATFORM [patent_app_type] => utility [patent_app_number] => 16/430900 [patent_app_country] => US [patent_app_date] => 2019-06-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9203 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 151 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16430900 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/430900
Controlling user creation of data resources on a data processing platform Jun 3, 2019 Issued
Array ( [id] => 15859553 [patent_doc_number] => 10645083 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-05-05 [patent_title] => Information processing apparatus, control method, and storage medium information processing apparatus and control method for authentication of user [patent_app_type] => utility [patent_app_number] => 16/409663 [patent_app_country] => US [patent_app_date] => 2019-05-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 18 [patent_no_of_words] => 10420 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 259 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16409663 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/409663
Information processing apparatus, control method, and storage medium information processing apparatus and control method for authentication of user May 9, 2019 Issued
Array ( [id] => 14724747 [patent_doc_number] => 20190253437 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-08-15 [patent_title] => IDENTIFYING AND RESPONDING TO SECURITY INCIDENTS BASED ON PREEMPTIVE FORENSICS [patent_app_type] => utility [patent_app_number] => 16/391285 [patent_app_country] => US [patent_app_date] => 2019-04-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5812 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 83 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16391285 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/391285
Identifying and responding to security incidents based on preemptive forensics Apr 21, 2019 Issued
Array ( [id] => 14679917 [patent_doc_number] => 20190239073 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-08-01 [patent_title] => Using Derived Credentials for Enrollment with Enterprise Mobile Device Management Services [patent_app_type] => utility [patent_app_number] => 16/378147 [patent_app_country] => US [patent_app_date] => 2019-04-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 19746 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 210 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16378147 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/378147
Using derived credentials for enrollment with enterprise mobile device management services Apr 7, 2019 Issued
Array ( [id] => 15919483 [patent_doc_number] => 10656981 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-05-19 [patent_title] => Anomaly detection using sequences of system calls [patent_app_type] => utility [patent_app_number] => 16/363150 [patent_app_country] => US [patent_app_date] => 2019-03-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7264 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 182 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16363150 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/363150
Anomaly detection using sequences of system calls Mar 24, 2019 Issued
Array ( [id] => 14589993 [patent_doc_number] => 20190222605 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-07-18 [patent_title] => SYSTEMS AND METHODS FOR ATTACK SIMULATION ON A PRODUCTION NETWORK [patent_app_type] => utility [patent_app_number] => 16/298156 [patent_app_country] => US [patent_app_date] => 2019-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 27569 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 174 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16298156 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/298156
Systems and methods for attack simulation on a production network Mar 10, 2019 Issued
Array ( [id] => 15079481 [patent_doc_number] => 10469250 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-11-05 [patent_title] => Physical item mapping to blockchain framework [patent_app_type] => utility [patent_app_number] => 16/289083 [patent_app_country] => US [patent_app_date] => 2019-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10327 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 197 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16289083 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/289083
Physical item mapping to blockchain framework Feb 27, 2019 Issued
Menu