
Ali Shayanfar
Examiner (ID: 11667, Phone: (571)270-1050 , Office: P/2497 )
| Most Active Art Unit | 2497 |
| Art Unit(s) | 4100, 2493, 2142, 2439, 2497, 4167, 4164 |
| Total Applications | 540 |
| Issued Applications | 497 |
| Pending Applications | 2 |
| Abandoned Applications | 46 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11807854
[patent_doc_number] => 09548964
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-01-17
[patent_title] => 'VPN for containers and virtual machines in local area networks'
[patent_app_type] => utility
[patent_app_number] => 15/333379
[patent_app_country] => US
[patent_app_date] => 2016-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2824
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15333379
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/333379 | VPN for containers and virtual machines in local area networks | Oct 24, 2016 | Issued |
Array
(
[id] => 11877555
[patent_doc_number] => 09749342
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-08-29
[patent_title] => 'System and method for detecting unauthorized device access by comparing multiple independent spatial-time data sets from other devices'
[patent_app_type] => utility
[patent_app_number] => 15/281988
[patent_app_country] => US
[patent_app_date] => 2016-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8817
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15281988
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/281988 | System and method for detecting unauthorized device access by comparing multiple independent spatial-time data sets from other devices | Sep 29, 2016 | Issued |
Array
(
[id] => 14270147
[patent_doc_number] => 10284654
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-07
[patent_title] => Trusted vehicle telematics using blockchain data analytics
[patent_app_type] => utility
[patent_app_number] => 15/277066
[patent_app_country] => US
[patent_app_date] => 2016-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10994
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15277066
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/277066 | Trusted vehicle telematics using blockchain data analytics | Sep 26, 2016 | Issued |
Array
(
[id] => 14153175
[patent_doc_number] => 10256981
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-09
[patent_title] => Secure logging for host security module
[patent_app_type] => utility
[patent_app_number] => 15/277215
[patent_app_country] => US
[patent_app_date] => 2016-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6316
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15277215
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/277215 | Secure logging for host security module | Sep 26, 2016 | Issued |
Array
(
[id] => 11752659
[patent_doc_number] => 09710673
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-18
[patent_title] => 'Conflict resolution for keychain syncing'
[patent_app_type] => utility
[patent_app_number] => 15/274733
[patent_app_country] => US
[patent_app_date] => 2016-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 28
[patent_no_of_words] => 24924
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15274733
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/274733 | Conflict resolution for keychain syncing | Sep 22, 2016 | Issued |
Array
(
[id] => 12101320
[patent_doc_number] => 09858416
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-02
[patent_title] => 'Malware protection'
[patent_app_type] => utility
[patent_app_number] => 15/263461
[patent_app_country] => US
[patent_app_date] => 2016-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 8027
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15263461
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/263461 | Malware protection | Sep 12, 2016 | Issued |
Array
(
[id] => 13976271
[patent_doc_number] => 10217498
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-26
[patent_title] => Techniques for preventing tampering with PROM settings
[patent_app_type] => utility
[patent_app_number] => 15/262417
[patent_app_country] => US
[patent_app_date] => 2016-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 13
[patent_no_of_words] => 10818
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15262417
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/262417 | Techniques for preventing tampering with PROM settings | Sep 11, 2016 | Issued |
Array
(
[id] => 11329228
[patent_doc_number] => 20160359840
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-08
[patent_title] => 'PRIVATE SIMULTANEOUS AUTHENTICATION OF EQUALS'
[patent_app_type] => utility
[patent_app_number] => 15/238512
[patent_app_country] => US
[patent_app_date] => 2016-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16167
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15238512
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/238512 | Private simultaneous authentication of equals | Aug 15, 2016 | Issued |
Array
(
[id] => 11726344
[patent_doc_number] => 09699219
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-04
[patent_title] => 'Access control using impersonization'
[patent_app_type] => utility
[patent_app_number] => 15/237505
[patent_app_country] => US
[patent_app_date] => 2016-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 22865
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15237505
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/237505 | Access control using impersonization | Aug 14, 2016 | Issued |
Array
(
[id] => 12187874
[patent_doc_number] => 20180046810
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-15
[patent_title] => 'APPLICATION INTEGRITY VERIFICATION IN MULTI-TIER ARCHITECTURES'
[patent_app_type] => utility
[patent_app_number] => 15/234833
[patent_app_country] => US
[patent_app_date] => 2016-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7311
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15234833
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/234833 | Application integrity verification in multi-tier architectures | Aug 10, 2016 | Issued |
Array
(
[id] => 12338028
[patent_doc_number] => 09948682
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-17
[patent_title] => Data resource control through a control policy defining an authorized context for utilization of a protected data resource
[patent_app_type] => utility
[patent_app_number] => 15/230421
[patent_app_country] => US
[patent_app_date] => 2016-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 35
[patent_no_of_words] => 30311
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 350
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15230421
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/230421 | Data resource control through a control policy defining an authorized context for utilization of a protected data resource | Aug 6, 2016 | Issued |
Array
(
[id] => 14095647
[patent_doc_number] => 10243745
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-03-26
[patent_title] => Method and system for producing a secure communication channel for terminals
[patent_app_type] => utility
[patent_app_number] => 15/219786
[patent_app_country] => US
[patent_app_date] => 2016-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 5967
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 313
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15219786
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/219786 | Method and system for producing a secure communication channel for terminals | Jul 25, 2016 | Issued |
Array
(
[id] => 12155720
[patent_doc_number] => 20180026985
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-25
[patent_title] => 'USAGE TRACKING IN HYBRID CLOUD COMPUTING SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 15/217541
[patent_app_country] => US
[patent_app_date] => 2016-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 10204
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15217541
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/217541 | Usage tracking in hybrid cloud computing systems | Jul 21, 2016 | Issued |
Array
(
[id] => 12155713
[patent_doc_number] => 20180026978
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-25
[patent_title] => 'SYSTEMS AND METHODS FOR ADDING A NON-INHERENT COMPONENT TO A DEVICE KEY OF A NETWORKED DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/217365
[patent_app_country] => US
[patent_app_date] => 2016-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6520
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15217365
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/217365 | Systems and methods for adding a non-inherent component to a device key of a networked device | Jul 21, 2016 | Issued |
Array
(
[id] => 12153610
[patent_doc_number] => 20180024874
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-25
[patent_title] => 'ANOMALY DETECTION USING SEQUENCES OF SYSTEM CALLS'
[patent_app_type] => utility
[patent_app_number] => 15/213874
[patent_app_country] => US
[patent_app_date] => 2016-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7326
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15213874
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/213874 | Anomaly detection using sequences of system calls | Jul 18, 2016 | Issued |
Array
(
[id] => 11639018
[patent_doc_number] => 09661009
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-05-23
[patent_title] => 'Network-based malware detection'
[patent_app_type] => utility
[patent_app_number] => 15/213306
[patent_app_country] => US
[patent_app_date] => 2016-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6638
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15213306
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/213306 | Network-based malware detection | Jul 17, 2016 | Issued |
Array
(
[id] => 11849121
[patent_doc_number] => 09736694
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-15
[patent_title] => 'Authorization based on access token'
[patent_app_type] => utility
[patent_app_number] => 15/208489
[patent_app_country] => US
[patent_app_date] => 2016-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5045
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 250
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15208489
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/208489 | Authorization based on access token | Jul 11, 2016 | Issued |
Array
(
[id] => 12130187
[patent_doc_number] => 20180013773
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-01-11
[patent_title] => 'METHOD AND SYSTEM FOR CORRELATION AND MANAGEMENT OF DISTRIBUTED AND HETEROGENEOUS EVENTS'
[patent_app_type] => utility
[patent_app_number] => 15/206878
[patent_app_country] => US
[patent_app_date] => 2016-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6617
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15206878
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/206878 | Method and system for correlation and management of distributed and heterogeneous events | Jul 10, 2016 | Issued |
Array
(
[id] => 11440292
[patent_doc_number] => 20170041314
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-09
[patent_title] => 'BIOMETRIC INFORMATION MANAGEMENT METHOD AND BIOMETRIC INFORMATION MANAGEMENT APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 15/204754
[patent_app_country] => US
[patent_app_date] => 2016-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8025
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15204754
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/204754 | Biometric information management method and biometric information management apparatus | Jul 6, 2016 | Issued |
Array
(
[id] => 11884885
[patent_doc_number] => 09756080
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-05
[patent_title] => 'Protecting content from third party using client-side security protection'
[patent_app_type] => utility
[patent_app_number] => 15/202875
[patent_app_country] => US
[patent_app_date] => 2016-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 7477
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15202875
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/202875 | Protecting content from third party using client-side security protection | Jul 5, 2016 | Issued |