
Helai Salehi
Examiner (ID: 4533, Phone: (571)270-7468 , Office: P/2433 )
| Most Active Art Unit | 2433 |
| Art Unit(s) | 2433 |
| Total Applications | 554 |
| Issued Applications | 388 |
| Pending Applications | 46 |
| Abandoned Applications | 139 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16426094
[patent_doc_number] => 20200351292
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-05
[patent_title] => SOURCE ENTITIES OF SECURITY INDICATORS
[patent_app_type] => utility
[patent_app_number] => 16/076274
[patent_app_country] => US
[patent_app_date] => 2016-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6196
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16076274
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/076274 | Source entities of security indicators | Feb 11, 2016 | Issued |
Array
(
[id] => 11260347
[patent_doc_number] => 09485265
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-11-01
[patent_title] => 'Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces'
[patent_app_type] => utility
[patent_app_number] => 15/017324
[patent_app_country] => US
[patent_app_date] => 2016-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 13254
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 320
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15017324
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/017324 | Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces | Feb 4, 2016 | Issued |
Array
(
[id] => 15549343
[patent_doc_number] => 10574468
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-25
[patent_title] => Chaos nanonet device, and chaos nanonet-based PUF security apparatus
[patent_app_type] => utility
[patent_app_number] => 15/542551
[patent_app_country] => US
[patent_app_date] => 2016-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 10727
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15542551
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/542551 | Chaos nanonet device, and chaos nanonet-based PUF security apparatus | Jan 5, 2016 | Issued |
Array
(
[id] => 11891818
[patent_doc_number] => 09762391
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-12
[patent_title] => 'Chip authentication technology using carbon nanotubes'
[patent_app_type] => utility
[patent_app_number] => 14/953695
[patent_app_country] => US
[patent_app_date] => 2015-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4641
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14953695
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/953695 | Chip authentication technology using carbon nanotubes | Nov 29, 2015 | Issued |
Array
(
[id] => 12163587
[patent_doc_number] => 20180034852
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-02-01
[patent_title] => 'ANTI-SPOOFING SYSTEM AND METHODS USEFUL IN CONJUNCTION THEREWITH'
[patent_app_type] => utility
[patent_app_number] => 15/531229
[patent_app_country] => US
[patent_app_date] => 2015-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11544
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15531229
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/531229 | ANTI-SPOOFING SYSTEM AND METHODS USEFUL IN CONJUNCTION THEREWITH | Nov 23, 2015 | Abandoned |
Array
(
[id] => 11418187
[patent_doc_number] => 09565021
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-02-07
[patent_title] => 'Shape actuation encapsulant of a cryptographic module'
[patent_app_type] => utility
[patent_app_number] => 14/942433
[patent_app_country] => US
[patent_app_date] => 2015-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 16
[patent_no_of_words] => 5713
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14942433
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/942433 | Shape actuation encapsulant of a cryptographic module | Nov 15, 2015 | Issued |
Array
(
[id] => 14771153
[patent_doc_number] => 10396989
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-27
[patent_title] => Method and server for providing transaction keys
[patent_app_type] => utility
[patent_app_number] => 15/525717
[patent_app_country] => US
[patent_app_date] => 2015-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 2
[patent_no_of_words] => 2655
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15525717
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/525717 | Method and server for providing transaction keys | Nov 8, 2015 | Issued |
Array
(
[id] => 10726694
[patent_doc_number] => 20160072843
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'Policy-Based Control Layer in a Communication Fabric'
[patent_app_type] => utility
[patent_app_number] => 14/930159
[patent_app_country] => US
[patent_app_date] => 2015-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4422
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14930159
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/930159 | Policy-based control layer in a communication fabric | Nov 1, 2015 | Issued |
Array
(
[id] => 11069958
[patent_doc_number] => 20160266922
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-15
[patent_title] => 'SERVICE MANIFESTS'
[patent_app_type] => utility
[patent_app_number] => 14/887088
[patent_app_country] => US
[patent_app_date] => 2015-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 12800
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14887088
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/887088 | Service manifests | Oct 18, 2015 | Issued |
Array
(
[id] => 13486845
[patent_doc_number] => 20180294965
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-11
[patent_title] => APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT FOR AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 15/766994
[patent_app_country] => US
[patent_app_date] => 2015-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11036
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15766994
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/766994 | APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT FOR AUTHENTICATION | Oct 14, 2015 | Abandoned |
Array
(
[id] => 12576429
[patent_doc_number] => 10021083
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-10
[patent_title] => Providing credential information
[patent_app_type] => utility
[patent_app_number] => 14/878365
[patent_app_country] => US
[patent_app_date] => 2015-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 15636
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 412
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14878365
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/878365 | Providing credential information | Oct 7, 2015 | Issued |
Array
(
[id] => 10667972
[patent_doc_number] => 20160014117
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-14
[patent_title] => 'Authentication method using security token, and system and apparatus for same'
[patent_app_type] => utility
[patent_app_number] => 14/863968
[patent_app_country] => US
[patent_app_date] => 2015-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11558
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14863968
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/863968 | Authentication method using security token, and system and apparatus for same | Sep 23, 2015 | Abandoned |
Array
(
[id] => 13487935
[patent_doc_number] => 20180295510
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-10-11
[patent_title] => USER PROFILE PROVISIONING IN WLAN
[patent_app_type] => utility
[patent_app_number] => 15/754329
[patent_app_country] => US
[patent_app_date] => 2015-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7401
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15754329
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/754329 | User profile provisioning in WLAN | Aug 24, 2015 | Issued |
Array
(
[id] => 13380057
[patent_doc_number] => 20180241570
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-23
[patent_title] => SECURITY AUTHENTICATION METHOD, CONFIGURATION METHOD, AND RELATED DEVICE
[patent_app_type] => utility
[patent_app_number] => 15/751864
[patent_app_country] => US
[patent_app_date] => 2015-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17550
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15751864
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/751864 | Method for establishing secured connection, and related device | Aug 23, 2015 | Issued |
Array
(
[id] => 10690707
[patent_doc_number] => 20160036853
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'STORAGE MEDIUM STORING PROGRAM FOR LOGIN ALERTS, AND METHOD AND SYSTEM THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/806003
[patent_app_country] => US
[patent_app_date] => 2015-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6063
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14806003
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/806003 | STORAGE MEDIUM STORING PROGRAM FOR LOGIN ALERTS, AND METHOD AND SYSTEM THEREOF | Jul 21, 2015 | Abandoned |
Array
(
[id] => 14176279
[patent_doc_number] => 10262155
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-04-16
[patent_title] => Disabling features using feature toggle
[patent_app_type] => utility
[patent_app_number] => 14/755653
[patent_app_country] => US
[patent_app_date] => 2015-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8510
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 307
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14755653
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/755653 | Disabling features using feature toggle | Jun 29, 2015 | Issued |
Array
(
[id] => 15843535
[patent_doc_number] => 20200137050
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-30
[patent_title] => METHOD AND SYSTEM FOR APPLYING NEGATIVE CREDENTIALS
[patent_app_type] => utility
[patent_app_number] => 14/753487
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12380
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 264
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14753487
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/753487 | METHOD AND SYSTEM FOR APPLYING NEGATIVE CREDENTIALS | Jun 28, 2015 | Abandoned |
Array
(
[id] => 12011873
[patent_doc_number] => 09805192
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-10-31
[patent_title] => 'Systems and methods for file classification'
[patent_app_type] => utility
[patent_app_number] => 14/751178
[patent_app_country] => US
[patent_app_date] => 2015-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10240
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14751178
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/751178 | Systems and methods for file classification | Jun 25, 2015 | Issued |
Array
(
[id] => 10410933
[patent_doc_number] => 20150295942
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-15
[patent_title] => 'METHOD AND SERVER FOR PERFORMING CLOUD DETECTION FOR MALICIOUS INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 14/749435
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6057
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14749435
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/749435 | METHOD AND SERVER FOR PERFORMING CLOUD DETECTION FOR MALICIOUS INFORMATION | Jun 23, 2015 | Abandoned |
Array
(
[id] => 12317571
[patent_doc_number] => 09942248
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-04-10
[patent_title] => Systems and methods for adjusting behavioral detection heuristics
[patent_app_type] => utility
[patent_app_number] => 14/748268
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9211
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14748268
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/748268 | Systems and methods for adjusting behavioral detection heuristics | Jun 23, 2015 | Issued |