
Ali Shayanfar
Examiner (ID: 11667, Phone: (571)270-1050 , Office: P/2497 )
| Most Active Art Unit | 2497 |
| Art Unit(s) | 4100, 2493, 2142, 2439, 2497, 4167, 4164 |
| Total Applications | 540 |
| Issued Applications | 497 |
| Pending Applications | 2 |
| Abandoned Applications | 46 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16217489
[patent_doc_number] => 10733303
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-08-04
[patent_title] => Polymorphic code translation systems and methods
[patent_app_type] => utility
[patent_app_number] => 16/856928
[patent_app_country] => US
[patent_app_date] => 2020-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 12
[patent_no_of_words] => 9845
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 586
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16856928
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/856928 | Polymorphic code translation systems and methods | Apr 22, 2020 | Issued |
Array
(
[id] => 16447150
[patent_doc_number] => 10839079
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-17
[patent_title] => Systems and methods for tamper-resistant verification of firmware with a trusted platform module
[patent_app_type] => utility
[patent_app_number] => 16/735931
[patent_app_country] => US
[patent_app_date] => 2020-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4881
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16735931
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/735931 | Systems and methods for tamper-resistant verification of firmware with a trusted platform module | Jan 6, 2020 | Issued |
Array
(
[id] => 16323291
[patent_doc_number] => 10783257
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-09-22
[patent_title] => Use of word embeddings to locate sensitive text in computer programming scripts
[patent_app_type] => utility
[patent_app_number] => 16/722867
[patent_app_country] => US
[patent_app_date] => 2019-12-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5538
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16722867
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/722867 | Use of word embeddings to locate sensitive text in computer programming scripts | Dec 19, 2019 | Issued |
Array
(
[id] => 16449319
[patent_doc_number] => 10841254
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-17
[patent_title] => Asymmetric permissions in a communications system
[patent_app_type] => utility
[patent_app_number] => 16/716844
[patent_app_country] => US
[patent_app_date] => 2019-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5140
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16716844
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/716844 | Asymmetric permissions in a communications system | Dec 16, 2019 | Issued |
Array
(
[id] => 15924357
[patent_doc_number] => 10659434
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-05-19
[patent_title] => Application whitelist using a controlled node flow
[patent_app_type] => utility
[patent_app_number] => 16/667774
[patent_app_country] => US
[patent_app_date] => 2019-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 33
[patent_figures_cnt] => 34
[patent_no_of_words] => 18002
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 302
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16667774
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/667774 | Application whitelist using a controlled node flow | Oct 28, 2019 | Issued |
Array
(
[id] => 16419029
[patent_doc_number] => 10826944
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-11-03
[patent_title] => Systems and methods for network security
[patent_app_type] => utility
[patent_app_number] => 16/586151
[patent_app_country] => US
[patent_app_date] => 2019-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 3917
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16586151
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/586151 | Systems and methods for network security | Sep 26, 2019 | Issued |
Array
(
[id] => 15186935
[patent_doc_number] => 20190364059
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-28
[patent_title] => Identifying command and control endpoint used by domain generation algorithm (DGA) malware
[patent_app_type] => utility
[patent_app_number] => 16/519029
[patent_app_country] => US
[patent_app_date] => 2019-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6370
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16519029
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/519029 | Identifying command and control endpoint used by domain generation algorithm (DGA) malware | Jul 22, 2019 | Issued |
Array
(
[id] => 16357355
[patent_doc_number] => 10797880
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-06
[patent_title] => Access manager
[patent_app_type] => utility
[patent_app_number] => 16/514833
[patent_app_country] => US
[patent_app_date] => 2019-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 16
[patent_no_of_words] => 4803
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16514833
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/514833 | Access manager | Jul 16, 2019 | Issued |
Array
(
[id] => 15125533
[patent_doc_number] => 20190349400
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-14
[patent_title] => SYSTEMS AND METHODS OF DETECTING EMAIL-BASED ATTACKS THROUGH MACHINE LEARNING
[patent_app_type] => utility
[patent_app_number] => 16/507743
[patent_app_country] => US
[patent_app_date] => 2019-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8741
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16507743
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/507743 | Systems and methods of detecting email-based attacks through machine learning | Jul 9, 2019 | Issued |
Array
(
[id] => 15232405
[patent_doc_number] => 10503927
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-12-10
[patent_title] => Method and system for securing cloud storage and databases from insider threats and optimizing performance
[patent_app_type] => utility
[patent_app_number] => 16/506285
[patent_app_country] => US
[patent_app_date] => 2019-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 8971
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16506285
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/506285 | Method and system for securing cloud storage and databases from insider threats and optimizing performance | Jul 8, 2019 | Issued |
Array
(
[id] => 15353595
[patent_doc_number] => 20200014689
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-09
[patent_title] => USB DEVICE FOR NETWORK SECURITY
[patent_app_type] => utility
[patent_app_number] => 16/505318
[patent_app_country] => US
[patent_app_date] => 2019-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5956
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 263
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16505318
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/505318 | USB device for network security | Jul 7, 2019 | Issued |
Array
(
[id] => 14941117
[patent_doc_number] => 20190306197
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-03
[patent_title] => AUTOMATED SERVICE-ORIENTED PERFORMANCE MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 16/443476
[patent_app_country] => US
[patent_app_date] => 2019-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10837
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 242
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16443476
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/443476 | Automated service-oriented performance management | Jun 16, 2019 | Issued |
Array
(
[id] => 16387634
[patent_doc_number] => 10812490
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-20
[patent_title] => Permissions using blockchain
[patent_app_type] => utility
[patent_app_number] => 16/432012
[patent_app_country] => US
[patent_app_date] => 2019-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6496
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16432012
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/432012 | Permissions using blockchain | Jun 4, 2019 | Issued |
Array
(
[id] => 14877535
[patent_doc_number] => 20190289009
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-19
[patent_title] => CONTROLLING USER CREATION OF DATA RESOURCES ON A DATA PROCESSING PLATFORM
[patent_app_type] => utility
[patent_app_number] => 16/430900
[patent_app_country] => US
[patent_app_date] => 2019-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9203
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16430900
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/430900 | Controlling user creation of data resources on a data processing platform | Jun 3, 2019 | Issued |
Array
(
[id] => 15859553
[patent_doc_number] => 10645083
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-05
[patent_title] => Information processing apparatus, control method, and storage medium information processing apparatus and control method for authentication of user
[patent_app_type] => utility
[patent_app_number] => 16/409663
[patent_app_country] => US
[patent_app_date] => 2019-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 18
[patent_no_of_words] => 10420
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16409663
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/409663 | Information processing apparatus, control method, and storage medium information processing apparatus and control method for authentication of user | May 9, 2019 | Issued |
Array
(
[id] => 14724747
[patent_doc_number] => 20190253437
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-15
[patent_title] => IDENTIFYING AND RESPONDING TO SECURITY INCIDENTS BASED ON PREEMPTIVE FORENSICS
[patent_app_type] => utility
[patent_app_number] => 16/391285
[patent_app_country] => US
[patent_app_date] => 2019-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5812
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16391285
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/391285 | Identifying and responding to security incidents based on preemptive forensics | Apr 21, 2019 | Issued |
Array
(
[id] => 14679917
[patent_doc_number] => 20190239073
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => Using Derived Credentials for Enrollment with Enterprise Mobile Device Management Services
[patent_app_type] => utility
[patent_app_number] => 16/378147
[patent_app_country] => US
[patent_app_date] => 2019-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19746
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16378147
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/378147 | Using derived credentials for enrollment with enterprise mobile device management services | Apr 7, 2019 | Issued |
Array
(
[id] => 15919483
[patent_doc_number] => 10656981
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-19
[patent_title] => Anomaly detection using sequences of system calls
[patent_app_type] => utility
[patent_app_number] => 16/363150
[patent_app_country] => US
[patent_app_date] => 2019-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7264
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 182
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16363150
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/363150 | Anomaly detection using sequences of system calls | Mar 24, 2019 | Issued |
Array
(
[id] => 14589993
[patent_doc_number] => 20190222605
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-07-18
[patent_title] => SYSTEMS AND METHODS FOR ATTACK SIMULATION ON A PRODUCTION NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/298156
[patent_app_country] => US
[patent_app_date] => 2019-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 27569
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16298156
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/298156 | Systems and methods for attack simulation on a production network | Mar 10, 2019 | Issued |
Array
(
[id] => 15079481
[patent_doc_number] => 10469250
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-05
[patent_title] => Physical item mapping to blockchain framework
[patent_app_type] => utility
[patent_app_number] => 16/289083
[patent_app_country] => US
[patent_app_date] => 2019-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10327
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16289083
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/289083 | Physical item mapping to blockchain framework | Feb 27, 2019 | Issued |