Search

Ali Shayanfar

Examiner (ID: 11667, Phone: (571)270-1050 , Office: P/2497 )

Most Active Art Unit
2497
Art Unit(s)
4100, 2493, 2142, 2439, 2497, 4167, 4164
Total Applications
540
Issued Applications
497
Pending Applications
2
Abandoned Applications
46

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11807854 [patent_doc_number] => 09548964 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-01-17 [patent_title] => 'VPN for containers and virtual machines in local area networks' [patent_app_type] => utility [patent_app_number] => 15/333379 [patent_app_country] => US [patent_app_date] => 2016-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2824 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 169 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15333379 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/333379
VPN for containers and virtual machines in local area networks Oct 24, 2016 Issued
Array ( [id] => 11877555 [patent_doc_number] => 09749342 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-08-29 [patent_title] => 'System and method for detecting unauthorized device access by comparing multiple independent spatial-time data sets from other devices' [patent_app_type] => utility [patent_app_number] => 15/281988 [patent_app_country] => US [patent_app_date] => 2016-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 8817 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 222 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15281988 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/281988
System and method for detecting unauthorized device access by comparing multiple independent spatial-time data sets from other devices Sep 29, 2016 Issued
Array ( [id] => 14270147 [patent_doc_number] => 10284654 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-05-07 [patent_title] => Trusted vehicle telematics using blockchain data analytics [patent_app_type] => utility [patent_app_number] => 15/277066 [patent_app_country] => US [patent_app_date] => 2016-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10994 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15277066 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/277066
Trusted vehicle telematics using blockchain data analytics Sep 26, 2016 Issued
Array ( [id] => 14153175 [patent_doc_number] => 10256981 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-04-09 [patent_title] => Secure logging for host security module [patent_app_type] => utility [patent_app_number] => 15/277215 [patent_app_country] => US [patent_app_date] => 2016-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6316 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 210 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15277215 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/277215
Secure logging for host security module Sep 26, 2016 Issued
Array ( [id] => 11752659 [patent_doc_number] => 09710673 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-07-18 [patent_title] => 'Conflict resolution for keychain syncing' [patent_app_type] => utility [patent_app_number] => 15/274733 [patent_app_country] => US [patent_app_date] => 2016-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 28 [patent_figures_cnt] => 28 [patent_no_of_words] => 24924 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 178 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15274733 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/274733
Conflict resolution for keychain syncing Sep 22, 2016 Issued
Array ( [id] => 12101320 [patent_doc_number] => 09858416 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-01-02 [patent_title] => 'Malware protection' [patent_app_type] => utility [patent_app_number] => 15/263461 [patent_app_country] => US [patent_app_date] => 2016-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 8027 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 137 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15263461 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/263461
Malware protection Sep 12, 2016 Issued
Array ( [id] => 13976271 [patent_doc_number] => 10217498 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-02-26 [patent_title] => Techniques for preventing tampering with PROM settings [patent_app_type] => utility [patent_app_number] => 15/262417 [patent_app_country] => US [patent_app_date] => 2016-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 13 [patent_no_of_words] => 10818 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 111 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15262417 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/262417
Techniques for preventing tampering with PROM settings Sep 11, 2016 Issued
Array ( [id] => 11329228 [patent_doc_number] => 20160359840 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-08 [patent_title] => 'PRIVATE SIMULTANEOUS AUTHENTICATION OF EQUALS' [patent_app_type] => utility [patent_app_number] => 15/238512 [patent_app_country] => US [patent_app_date] => 2016-08-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 16167 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15238512 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/238512
Private simultaneous authentication of equals Aug 15, 2016 Issued
Array ( [id] => 11726344 [patent_doc_number] => 09699219 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-07-04 [patent_title] => 'Access control using impersonization' [patent_app_type] => utility [patent_app_number] => 15/237505 [patent_app_country] => US [patent_app_date] => 2016-08-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 22865 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 211 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15237505 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/237505
Access control using impersonization Aug 14, 2016 Issued
Array ( [id] => 12187874 [patent_doc_number] => 20180046810 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-02-15 [patent_title] => 'APPLICATION INTEGRITY VERIFICATION IN MULTI-TIER ARCHITECTURES' [patent_app_type] => utility [patent_app_number] => 15/234833 [patent_app_country] => US [patent_app_date] => 2016-08-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7311 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15234833 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/234833
Application integrity verification in multi-tier architectures Aug 10, 2016 Issued
Array ( [id] => 12338028 [patent_doc_number] => 09948682 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-04-17 [patent_title] => Data resource control through a control policy defining an authorized context for utilization of a protected data resource [patent_app_type] => utility [patent_app_number] => 15/230421 [patent_app_country] => US [patent_app_date] => 2016-08-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 31 [patent_figures_cnt] => 35 [patent_no_of_words] => 30311 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 350 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15230421 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/230421
Data resource control through a control policy defining an authorized context for utilization of a protected data resource Aug 6, 2016 Issued
Array ( [id] => 14095647 [patent_doc_number] => 10243745 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-03-26 [patent_title] => Method and system for producing a secure communication channel for terminals [patent_app_type] => utility [patent_app_number] => 15/219786 [patent_app_country] => US [patent_app_date] => 2016-07-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 5967 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 313 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15219786 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/219786
Method and system for producing a secure communication channel for terminals Jul 25, 2016 Issued
Array ( [id] => 12155720 [patent_doc_number] => 20180026985 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-01-25 [patent_title] => 'USAGE TRACKING IN HYBRID CLOUD COMPUTING SYSTEMS' [patent_app_type] => utility [patent_app_number] => 15/217541 [patent_app_country] => US [patent_app_date] => 2016-07-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 10204 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15217541 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/217541
Usage tracking in hybrid cloud computing systems Jul 21, 2016 Issued
Array ( [id] => 12155713 [patent_doc_number] => 20180026978 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-01-25 [patent_title] => 'SYSTEMS AND METHODS FOR ADDING A NON-INHERENT COMPONENT TO A DEVICE KEY OF A NETWORKED DEVICE' [patent_app_type] => utility [patent_app_number] => 15/217365 [patent_app_country] => US [patent_app_date] => 2016-07-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6520 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15217365 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/217365
Systems and methods for adding a non-inherent component to a device key of a networked device Jul 21, 2016 Issued
Array ( [id] => 12153610 [patent_doc_number] => 20180024874 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-01-25 [patent_title] => 'ANOMALY DETECTION USING SEQUENCES OF SYSTEM CALLS' [patent_app_type] => utility [patent_app_number] => 15/213874 [patent_app_country] => US [patent_app_date] => 2016-07-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7326 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15213874 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/213874
Anomaly detection using sequences of system calls Jul 18, 2016 Issued
Array ( [id] => 11639018 [patent_doc_number] => 09661009 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-05-23 [patent_title] => 'Network-based malware detection' [patent_app_type] => utility [patent_app_number] => 15/213306 [patent_app_country] => US [patent_app_date] => 2016-07-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6638 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 209 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15213306 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/213306
Network-based malware detection Jul 17, 2016 Issued
Array ( [id] => 11849121 [patent_doc_number] => 09736694 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-08-15 [patent_title] => 'Authorization based on access token' [patent_app_type] => utility [patent_app_number] => 15/208489 [patent_app_country] => US [patent_app_date] => 2016-07-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5045 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 250 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15208489 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/208489
Authorization based on access token Jul 11, 2016 Issued
Array ( [id] => 12130187 [patent_doc_number] => 20180013773 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-01-11 [patent_title] => 'METHOD AND SYSTEM FOR CORRELATION AND MANAGEMENT OF DISTRIBUTED AND HETEROGENEOUS EVENTS' [patent_app_type] => utility [patent_app_number] => 15/206878 [patent_app_country] => US [patent_app_date] => 2016-07-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6617 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15206878 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/206878
Method and system for correlation and management of distributed and heterogeneous events Jul 10, 2016 Issued
Array ( [id] => 11440292 [patent_doc_number] => 20170041314 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-02-09 [patent_title] => 'BIOMETRIC INFORMATION MANAGEMENT METHOD AND BIOMETRIC INFORMATION MANAGEMENT APPARATUS' [patent_app_type] => utility [patent_app_number] => 15/204754 [patent_app_country] => US [patent_app_date] => 2016-07-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 8025 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15204754 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/204754
Biometric information management method and biometric information management apparatus Jul 6, 2016 Issued
Array ( [id] => 11884885 [patent_doc_number] => 09756080 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-09-05 [patent_title] => 'Protecting content from third party using client-side security protection' [patent_app_type] => utility [patent_app_number] => 15/202875 [patent_app_country] => US [patent_app_date] => 2016-07-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 7477 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 164 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15202875 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/202875
Protecting content from third party using client-side security protection Jul 5, 2016 Issued
Menu