
Helai Salehi
Examiner (ID: 18806, Phone: (571)270-7468 , Office: P/2433 )
| Most Active Art Unit | 2433 |
| Art Unit(s) | 2433 |
| Total Applications | 561 |
| Issued Applications | 392 |
| Pending Applications | 40 |
| Abandoned Applications | 140 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13845951
[patent_doc_number] => 20190026460
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-01-24
[patent_title] => DYNAMIC CREATION OF ISOLATED SCRUBBING ENVIRONMENTS
[patent_app_type] => utility
[patent_app_number] => 15/654169
[patent_app_country] => US
[patent_app_date] => 2017-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8814
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15654169
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/654169 | DYNAMIC CREATION OF ISOLATED SCRUBBING ENVIRONMENTS | Jul 18, 2017 | Abandoned |
Array
(
[id] => 15111111
[patent_doc_number] => 10476897
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-12
[patent_title] => Method and apparatus for improving network security
[patent_app_type] => utility
[patent_app_number] => 15/641841
[patent_app_country] => US
[patent_app_date] => 2017-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 10938
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15641841
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/641841 | Method and apparatus for improving network security | Jul 4, 2017 | Issued |
Array
(
[id] => 14380041
[patent_doc_number] => 20190163933
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-30
[patent_title] => SECURE COMPUTATION SYSTEM, SECURE COMPUTATION DEVICE, SECURE COMPUTATION METHOD, AND PROGRAM
[patent_app_type] => utility
[patent_app_number] => 16/313233
[patent_app_country] => US
[patent_app_date] => 2017-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2794
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16313233
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/313233 | Secure computation for reading multiple elements from a secure text array | Jun 29, 2017 | Issued |
Array
(
[id] => 15793825
[patent_doc_number] => 10630649
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-21
[patent_title] => Home automation system including encrypted device connection based upon publicly accessible connection file and related methods
[patent_app_type] => utility
[patent_app_number] => 15/628328
[patent_app_country] => US
[patent_app_date] => 2017-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 41
[patent_figures_cnt] => 53
[patent_no_of_words] => 17765
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15628328
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/628328 | Home automation system including encrypted device connection based upon publicly accessible connection file and related methods | Jun 19, 2017 | Issued |
Array
(
[id] => 13707505
[patent_doc_number] => 20170364707
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-21
[patent_title] => TECHNOLOGIES FOR TRUSTED I/O WITH A CHANNEL IDENTIFIER FILTER AND PROCESSOR-BASED CRYPTOGRAPHIC ENGINE
[patent_app_type] => utility
[patent_app_number] => 15/628008
[patent_app_country] => US
[patent_app_date] => 2017-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17161
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15628008
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/628008 | Technologies for trusted I/O with a channel identifier filter and processor-based cryptographic engine | Jun 19, 2017 | Issued |
Array
(
[id] => 13631519
[patent_doc_number] => 20180367313
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-20
[patent_title] => SECURE MEMORY AND HIERARCHICAL STRUCTURE AND SYSTEM THEREFOR
[patent_app_type] => utility
[patent_app_number] => 15/627974
[patent_app_country] => US
[patent_app_date] => 2017-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4062
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 65
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15627974
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/627974 | SECURE MEMORY AND HIERARCHICAL STRUCTURE AND SYSTEM THEREFOR | Jun 19, 2017 | Abandoned |
Array
(
[id] => 13631951
[patent_doc_number] => 20180367530
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-20
[patent_title] => CERTIFICATE PINNING IN HIGHLY SECURE NETWORK ENVIRONMENTS USING PUBLIC KEY CERTIFICATES OBTAINED FROM A DHCP (DYNAMIC HOST CONFIGURATION PROTOCOL) SERVER
[patent_app_type] => utility
[patent_app_number] => 15/628107
[patent_app_country] => US
[patent_app_date] => 2017-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12303
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15628107
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/628107 | Certificate pinning in highly secure network environments using public key certificates obtained from a DHCP (dynamic host configuration protocol) server | Jun 19, 2017 | Issued |
Array
(
[id] => 16745414
[patent_doc_number] => 10970404
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-06
[patent_title] => Method, apparatus, and computer-readable medium for automated construction of data masks
[patent_app_type] => utility
[patent_app_number] => 15/591661
[patent_app_country] => US
[patent_app_date] => 2017-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 30
[patent_no_of_words] => 13386
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15591661
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/591661 | Method, apparatus, and computer-readable medium for automated construction of data masks | May 9, 2017 | Issued |
Array
(
[id] => 16173934
[patent_doc_number] => 10715521
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-14
[patent_title] => Biometric face recognition based continuous authentication and authorization system
[patent_app_type] => utility
[patent_app_number] => 15/765993
[patent_app_country] => US
[patent_app_date] => 2017-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2030
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 369
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15765993
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/765993 | Biometric face recognition based continuous authentication and authorization system | May 8, 2017 | Issued |
Array
(
[id] => 13530319
[patent_doc_number] => 20180316702
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-01
[patent_title] => DETECTING AND MITIGATING LEAKED CLOUD AUTHORIZATION KEYS
[patent_app_type] => utility
[patent_app_number] => 15/498418
[patent_app_country] => US
[patent_app_date] => 2017-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14649
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15498418
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/498418 | Detecting and mitigating leaked cloud authorization keys | Apr 25, 2017 | Issued |
Array
(
[id] => 11973716
[patent_doc_number] => 20170277870
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-28
[patent_title] => 'MODULAR SOFTWARE PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 15/483392
[patent_app_country] => US
[patent_app_date] => 2017-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9680
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15483392
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/483392 | Modular software protection | Apr 9, 2017 | Issued |
Array
(
[id] => 13472979
[patent_doc_number] => 20180288032
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-04
[patent_title] => Account Take Over Prevention
[patent_app_type] => utility
[patent_app_number] => 15/470951
[patent_app_country] => US
[patent_app_date] => 2017-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4634
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15470951
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/470951 | Account take over prevention | Mar 27, 2017 | Issued |
Array
(
[id] => 13433143
[patent_doc_number] => 20180268114
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-20
[patent_title] => Digital Credential System
[patent_app_type] => utility
[patent_app_number] => 15/463308
[patent_app_country] => US
[patent_app_date] => 2017-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14800
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15463308
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/463308 | Digital credential system | Mar 19, 2017 | Issued |
Array
(
[id] => 15079995
[patent_doc_number] => 10469509
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-05
[patent_title] => Gathering indicators of compromise for security threat detection
[patent_app_type] => utility
[patent_app_number] => 15/394377
[patent_app_country] => US
[patent_app_date] => 2016-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 8826
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15394377
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/394377 | Gathering indicators of compromise for security threat detection | Dec 28, 2016 | Issued |
Array
(
[id] => 16929658
[patent_doc_number] => 11051162
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-29
[patent_title] => Method for anonymously identifying a security module
[patent_app_type] => utility
[patent_app_number] => 15/778482
[patent_app_country] => US
[patent_app_date] => 2016-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 6588
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 344
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15778482
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/778482 | Method for anonymously identifying a security module | Nov 8, 2016 | Issued |
Array
(
[id] => 13526529
[patent_doc_number] => 20180314807
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-11-01
[patent_title] => FILE PERMISSION CONTROL METHOD
[patent_app_type] => utility
[patent_app_number] => 15/772119
[patent_app_country] => US
[patent_app_date] => 2016-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1891
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 271
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15772119
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/772119 | FILE PERMISSION CONTROL METHOD | Nov 7, 2016 | Abandoned |
Array
(
[id] => 12194780
[patent_doc_number] => 09898509
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-20
[patent_title] => 'Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces'
[patent_app_type] => utility
[patent_app_number] => 15/336078
[patent_app_country] => US
[patent_app_date] => 2016-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 13299
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 292
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15336078
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/336078 | Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces | Oct 26, 2016 | Issued |
Array
(
[id] => 15550737
[patent_doc_number] => 10575173
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-25
[patent_title] => Virtualization of the evolved packet core to create a local EPC
[patent_app_type] => utility
[patent_app_number] => 15/334270
[patent_app_country] => US
[patent_app_date] => 2016-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11007
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15334270
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/334270 | Virtualization of the evolved packet core to create a local EPC | Oct 24, 2016 | Issued |
Array
(
[id] => 17058631
[patent_doc_number] => 11103212
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-31
[patent_title] => Systems and methods for associating and verifying an association of a transducer with an imaging device
[patent_app_type] => utility
[patent_app_number] => 15/772973
[patent_app_country] => US
[patent_app_date] => 2016-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8575
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15772973
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/772973 | Systems and methods for associating and verifying an association of a transducer with an imaging device | Oct 17, 2016 | Issued |
Array
(
[id] => 13486871
[patent_doc_number] => 20180294978
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-11
[patent_title] => SYSTEMS AND METHODS FOR IDENTIFYING CERTIFICATES
[patent_app_type] => utility
[patent_app_number] => 15/766745
[patent_app_country] => US
[patent_app_date] => 2016-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4382
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 75
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15766745
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/766745 | SYSTEMS AND METHODS FOR IDENTIFYING CERTIFICATES | Oct 16, 2016 | Abandoned |