Search

Ghodrat Jamshidi

Examiner (ID: 9587, Phone: (571)270-1956 , Office: P/2493 )

Most Active Art Unit
2493
Art Unit(s)
2494, 2493, 2498
Total Applications
768
Issued Applications
663
Pending Applications
45
Abandoned Applications
79

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 12357948 [patent_doc_number] => 09954837 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-04-24 [patent_title] => Method of multi-factor authenication during encrypted communications [patent_app_type] => utility [patent_app_number] => 14/841292 [patent_app_country] => US [patent_app_date] => 2015-08-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4738 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 111 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841292 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/841292
Method of multi-factor authenication during encrypted communications Aug 30, 2015 Issued
Array ( [id] => 12337857 [patent_doc_number] => 09948625 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-04-17 [patent_title] => Encrypted group communication method [patent_app_type] => utility [patent_app_number] => 14/841281 [patent_app_country] => US [patent_app_date] => 2015-08-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4778 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 116 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841281 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/841281
Encrypted group communication method Aug 30, 2015 Issued
Array ( [id] => 12378459 [patent_doc_number] => 09961056 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-05-01 [patent_title] => Method of deniable encrypted communications [patent_app_type] => utility [patent_app_number] => 14/841313 [patent_app_country] => US [patent_app_date] => 2015-08-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 5083 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 202 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841313 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/841313
Method of deniable encrypted communications Aug 30, 2015 Issued
Array ( [id] => 11000947 [patent_doc_number] => 20160197894 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-07-07 [patent_title] => 'METHOD OF GENERATING A DENIABLE ENCRYPTED COMMUNICATIONS VIA PASSWORD ENTRY' [patent_app_type] => utility [patent_app_number] => 14/841310 [patent_app_country] => US [patent_app_date] => 2015-08-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5319 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841310 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/841310
Method of generating a deniable encrypted communications via password entry Aug 30, 2015 Issued
Array ( [id] => 12576024 [patent_doc_number] => 10020946 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-07-10 [patent_title] => Multi-key encryption method [patent_app_type] => utility [patent_app_number] => 14/841288 [patent_app_country] => US [patent_app_date] => 2015-08-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4813 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841288 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/841288
Multi-key encryption method Aug 30, 2015 Issued
Array ( [id] => 10719424 [patent_doc_number] => 20160065571 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-03 [patent_title] => 'SYSTEM AND METHODS FOR SECURE FILE SHARING AND ACCESS MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 14/836557 [patent_app_country] => US [patent_app_date] => 2015-08-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 17895 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14836557 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/836557
SYSTEM AND METHODS FOR SECURE FILE SHARING AND ACCESS MANAGEMENT Aug 25, 2015 Abandoned
Array ( [id] => 10690702 [patent_doc_number] => 20160036849 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-04 [patent_title] => 'Method, Apparatus and System for Detecting and Disabling Computer Disruptive Technologies' [patent_app_type] => utility [patent_app_number] => 14/815906 [patent_app_country] => US [patent_app_date] => 2015-07-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9776 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815906 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/815906
Method, Apparatus and System for Detecting and Disabling Computer Disruptive Technologies Jul 30, 2015 Abandoned
Array ( [id] => 15702103 [patent_doc_number] => 10607234 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-31 [patent_title] => Counterfeit prevention [patent_app_type] => utility [patent_app_number] => 15/522348 [patent_app_country] => US [patent_app_date] => 2015-07-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7177 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 93 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15522348 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/522348
Counterfeit prevention Jul 21, 2015 Issued
Array ( [id] => 10690693 [patent_doc_number] => 20160036839 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-04 [patent_title] => 'CONTROLLER FOR SOFTWARE DEFINED NETWORKING AND METHOD OF DETECTING ATTACKER' [patent_app_type] => utility [patent_app_number] => 14/797601 [patent_app_country] => US [patent_app_date] => 2015-07-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 10555 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14797601 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/797601
Controller for software defined networking and method of detecting attacker Jul 12, 2015 Issued
Array ( [id] => 14615473 [patent_doc_number] => 10360440 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-23 [patent_title] => Mobile terminal and control method thereof [patent_app_type] => utility [patent_app_number] => 15/519102 [patent_app_country] => US [patent_app_date] => 2015-07-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 21 [patent_no_of_words] => 13123 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15519102 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/519102
Mobile terminal and control method thereof Jul 9, 2015 Issued
Array ( [id] => 13072891 [patent_doc_number] => 10057244 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-08-21 [patent_title] => Utilizing vehicle information as a security pin/passkey [patent_app_type] => utility [patent_app_number] => 14/795433 [patent_app_country] => US [patent_app_date] => 2015-07-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3390 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 108 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14795433 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/795433
Utilizing vehicle information as a security pin/passkey Jul 8, 2015 Issued
Array ( [id] => 15582425 [patent_doc_number] => 10581618 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-03 [patent_title] => System, method and apparatus for providing enrollment of devices in a network [patent_app_type] => utility [patent_app_number] => 14/795081 [patent_app_country] => US [patent_app_date] => 2015-07-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 3678 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 153 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14795081 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/795081
System, method and apparatus for providing enrollment of devices in a network Jul 8, 2015 Issued
Array ( [id] => 10994600 [patent_doc_number] => 20160191546 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-06-30 [patent_title] => 'APPLICATION MALWARE ISOLATION VIA HARDWARE SEPARATION' [patent_app_type] => utility [patent_app_number] => 14/794652 [patent_app_country] => US [patent_app_date] => 2015-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5440 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14794652 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/794652
APPLICATION MALWARE ISOLATION VIA HARDWARE SEPARATION Jul 7, 2015 Abandoned
Array ( [id] => 14556337 [patent_doc_number] => 10346630 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-09 [patent_title] => Method of managing several profiles in a secure element [patent_app_type] => utility [patent_app_number] => 15/503286 [patent_app_country] => US [patent_app_date] => 2015-07-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 3 [patent_no_of_words] => 2321 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15503286 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/503286
Method of managing several profiles in a secure element Jul 2, 2015 Issued
Array ( [id] => 15017469 [patent_doc_number] => 10454909 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-10-22 [patent_title] => Key negotiation method and system, network entity and computer storage medium [patent_app_type] => utility [patent_app_number] => 15/537118 [patent_app_country] => US [patent_app_date] => 2015-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8806 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/537118
Key negotiation method and system, network entity and computer storage medium Jun 30, 2015 Issued
Array ( [id] => 15017469 [patent_doc_number] => 10454909 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-10-22 [patent_title] => Key negotiation method and system, network entity and computer storage medium [patent_app_type] => utility [patent_app_number] => 15/537118 [patent_app_country] => US [patent_app_date] => 2015-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8806 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/537118
Key negotiation method and system, network entity and computer storage medium Jun 30, 2015 Issued
Array ( [id] => 15017469 [patent_doc_number] => 10454909 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-10-22 [patent_title] => Key negotiation method and system, network entity and computer storage medium [patent_app_type] => utility [patent_app_number] => 15/537118 [patent_app_country] => US [patent_app_date] => 2015-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8806 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/537118
Key negotiation method and system, network entity and computer storage medium Jun 30, 2015 Issued
Array ( [id] => 15017469 [patent_doc_number] => 10454909 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-10-22 [patent_title] => Key negotiation method and system, network entity and computer storage medium [patent_app_type] => utility [patent_app_number] => 15/537118 [patent_app_country] => US [patent_app_date] => 2015-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8806 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/537118
Key negotiation method and system, network entity and computer storage medium Jun 30, 2015 Issued
Array ( [id] => 10379029 [patent_doc_number] => 20150264037 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'TRUSTED VENDOR ACCESS' [patent_app_type] => utility [patent_app_number] => 14/713668 [patent_app_country] => US [patent_app_date] => 2015-05-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3476 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14713668 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/713668
Trusted vendor access May 14, 2015 Issued
Array ( [id] => 12174140 [patent_doc_number] => 09892285 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-02-13 [patent_title] => 'Accessory, electronic apparatus and system for accessory certification' [patent_app_type] => utility [patent_app_number] => 14/902307 [patent_app_country] => US [patent_app_date] => 2015-04-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 2 [patent_no_of_words] => 4325 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 110 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14902307 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/902307
Accessory, electronic apparatus and system for accessory certification Apr 12, 2015 Issued
Menu