
Ghodrat Jamshidi
Examiner (ID: 9587, Phone: (571)270-1956 , Office: P/2493 )
| Most Active Art Unit | 2493 |
| Art Unit(s) | 2494, 2493, 2498 |
| Total Applications | 768 |
| Issued Applications | 663 |
| Pending Applications | 45 |
| Abandoned Applications | 79 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12357948
[patent_doc_number] => 09954837
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-24
[patent_title] => Method of multi-factor authenication during encrypted communications
[patent_app_type] => utility
[patent_app_number] => 14/841292
[patent_app_country] => US
[patent_app_date] => 2015-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4738
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841292
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/841292 | Method of multi-factor authenication during encrypted communications | Aug 30, 2015 | Issued |
Array
(
[id] => 12337857
[patent_doc_number] => 09948625
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-17
[patent_title] => Encrypted group communication method
[patent_app_type] => utility
[patent_app_number] => 14/841281
[patent_app_country] => US
[patent_app_date] => 2015-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4778
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841281
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/841281 | Encrypted group communication method | Aug 30, 2015 | Issued |
Array
(
[id] => 12378459
[patent_doc_number] => 09961056
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-01
[patent_title] => Method of deniable encrypted communications
[patent_app_type] => utility
[patent_app_number] => 14/841313
[patent_app_country] => US
[patent_app_date] => 2015-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 5083
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841313
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/841313 | Method of deniable encrypted communications | Aug 30, 2015 | Issued |
Array
(
[id] => 11000947
[patent_doc_number] => 20160197894
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-07
[patent_title] => 'METHOD OF GENERATING A DENIABLE ENCRYPTED COMMUNICATIONS VIA PASSWORD ENTRY'
[patent_app_type] => utility
[patent_app_number] => 14/841310
[patent_app_country] => US
[patent_app_date] => 2015-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5319
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841310
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/841310 | Method of generating a deniable encrypted communications via password entry | Aug 30, 2015 | Issued |
Array
(
[id] => 12576024
[patent_doc_number] => 10020946
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-10
[patent_title] => Multi-key encryption method
[patent_app_type] => utility
[patent_app_number] => 14/841288
[patent_app_country] => US
[patent_app_date] => 2015-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4813
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841288
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/841288 | Multi-key encryption method | Aug 30, 2015 | Issued |
Array
(
[id] => 10719424
[patent_doc_number] => 20160065571
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'SYSTEM AND METHODS FOR SECURE FILE SHARING AND ACCESS MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/836557
[patent_app_country] => US
[patent_app_date] => 2015-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 17895
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14836557
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/836557 | SYSTEM AND METHODS FOR SECURE FILE SHARING AND ACCESS MANAGEMENT | Aug 25, 2015 | Abandoned |
Array
(
[id] => 10690702
[patent_doc_number] => 20160036849
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'Method, Apparatus and System for Detecting and Disabling Computer Disruptive Technologies'
[patent_app_type] => utility
[patent_app_number] => 14/815906
[patent_app_country] => US
[patent_app_date] => 2015-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9776
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815906
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/815906 | Method, Apparatus and System for Detecting and Disabling Computer Disruptive Technologies | Jul 30, 2015 | Abandoned |
Array
(
[id] => 15702103
[patent_doc_number] => 10607234
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-31
[patent_title] => Counterfeit prevention
[patent_app_type] => utility
[patent_app_number] => 15/522348
[patent_app_country] => US
[patent_app_date] => 2015-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7177
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15522348
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/522348 | Counterfeit prevention | Jul 21, 2015 | Issued |
Array
(
[id] => 10690693
[patent_doc_number] => 20160036839
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'CONTROLLER FOR SOFTWARE DEFINED NETWORKING AND METHOD OF DETECTING ATTACKER'
[patent_app_type] => utility
[patent_app_number] => 14/797601
[patent_app_country] => US
[patent_app_date] => 2015-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 10555
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14797601
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/797601 | Controller for software defined networking and method of detecting attacker | Jul 12, 2015 | Issued |
Array
(
[id] => 14615473
[patent_doc_number] => 10360440
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-23
[patent_title] => Mobile terminal and control method thereof
[patent_app_type] => utility
[patent_app_number] => 15/519102
[patent_app_country] => US
[patent_app_date] => 2015-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 21
[patent_no_of_words] => 13123
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15519102
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/519102 | Mobile terminal and control method thereof | Jul 9, 2015 | Issued |
Array
(
[id] => 13072891
[patent_doc_number] => 10057244
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-21
[patent_title] => Utilizing vehicle information as a security pin/passkey
[patent_app_type] => utility
[patent_app_number] => 14/795433
[patent_app_country] => US
[patent_app_date] => 2015-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3390
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14795433
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/795433 | Utilizing vehicle information as a security pin/passkey | Jul 8, 2015 | Issued |
Array
(
[id] => 15582425
[patent_doc_number] => 10581618
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-03
[patent_title] => System, method and apparatus for providing enrollment of devices in a network
[patent_app_type] => utility
[patent_app_number] => 14/795081
[patent_app_country] => US
[patent_app_date] => 2015-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 3678
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14795081
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/795081 | System, method and apparatus for providing enrollment of devices in a network | Jul 8, 2015 | Issued |
Array
(
[id] => 10994600
[patent_doc_number] => 20160191546
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-30
[patent_title] => 'APPLICATION MALWARE ISOLATION VIA HARDWARE SEPARATION'
[patent_app_type] => utility
[patent_app_number] => 14/794652
[patent_app_country] => US
[patent_app_date] => 2015-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5440
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14794652
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/794652 | APPLICATION MALWARE ISOLATION VIA HARDWARE SEPARATION | Jul 7, 2015 | Abandoned |
Array
(
[id] => 14556337
[patent_doc_number] => 10346630
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-09
[patent_title] => Method of managing several profiles in a secure element
[patent_app_type] => utility
[patent_app_number] => 15/503286
[patent_app_country] => US
[patent_app_date] => 2015-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 2321
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15503286
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/503286 | Method of managing several profiles in a secure element | Jul 2, 2015 | Issued |
Array
(
[id] => 15017469
[patent_doc_number] => 10454909
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Key negotiation method and system, network entity and computer storage medium
[patent_app_type] => utility
[patent_app_number] => 15/537118
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8806
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/537118 | Key negotiation method and system, network entity and computer storage medium | Jun 30, 2015 | Issued |
Array
(
[id] => 15017469
[patent_doc_number] => 10454909
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Key negotiation method and system, network entity and computer storage medium
[patent_app_type] => utility
[patent_app_number] => 15/537118
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8806
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/537118 | Key negotiation method and system, network entity and computer storage medium | Jun 30, 2015 | Issued |
Array
(
[id] => 15017469
[patent_doc_number] => 10454909
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Key negotiation method and system, network entity and computer storage medium
[patent_app_type] => utility
[patent_app_number] => 15/537118
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8806
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/537118 | Key negotiation method and system, network entity and computer storage medium | Jun 30, 2015 | Issued |
Array
(
[id] => 15017469
[patent_doc_number] => 10454909
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Key negotiation method and system, network entity and computer storage medium
[patent_app_type] => utility
[patent_app_number] => 15/537118
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8806
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/537118 | Key negotiation method and system, network entity and computer storage medium | Jun 30, 2015 | Issued |
Array
(
[id] => 10379029
[patent_doc_number] => 20150264037
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'TRUSTED VENDOR ACCESS'
[patent_app_type] => utility
[patent_app_number] => 14/713668
[patent_app_country] => US
[patent_app_date] => 2015-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3476
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14713668
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/713668 | Trusted vendor access | May 14, 2015 | Issued |
Array
(
[id] => 12174140
[patent_doc_number] => 09892285
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-13
[patent_title] => 'Accessory, electronic apparatus and system for accessory certification'
[patent_app_type] => utility
[patent_app_number] => 14/902307
[patent_app_country] => US
[patent_app_date] => 2015-04-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 2
[patent_no_of_words] => 4325
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14902307
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/902307 | Accessory, electronic apparatus and system for accessory certification | Apr 12, 2015 | Issued |