
Helai Salehi
Examiner (ID: 4533, Phone: (571)270-7468 , Office: P/2433 )
| Most Active Art Unit | 2433 |
| Art Unit(s) | 2433 |
| Total Applications | 554 |
| Issued Applications | 388 |
| Pending Applications | 46 |
| Abandoned Applications | 139 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9852982
[patent_doc_number] => 08954729
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-10
[patent_title] => 'Creating and using a specific user unique id for security login authentication'
[patent_app_type] => utility
[patent_app_number] => 13/789248
[patent_app_country] => US
[patent_app_date] => 2013-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3442
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 163
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13789248
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/789248 | Creating and using a specific user unique id for security login authentication | Mar 6, 2013 | Issued |
Array
(
[id] => 9723481
[patent_doc_number] => 20140259182
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-11
[patent_title] => 'SYSTEM AND METHOD FOR MANAGING MEDIA CONTENT'
[patent_app_type] => utility
[patent_app_number] => 13/786684
[patent_app_country] => US
[patent_app_date] => 2013-03-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8332
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13786684
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/786684 | SYSTEM AND METHOD FOR MANAGING MEDIA CONTENT | Mar 5, 2013 | Abandoned |
Array
(
[id] => 9688642
[patent_doc_number] => 20140245408
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-28
[patent_title] => 'BIOMETRIC APPROACH TO TRACK CREDENTIALS OF ANONYMOUS USER OF A MOBILE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/783787
[patent_app_country] => US
[patent_app_date] => 2013-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2554
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13783787
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/783787 | BIOMETRIC APPROACH TO TRACK CREDENTIALS OF ANONYMOUS USER OF A MOBILE DEVICE | Mar 3, 2013 | Abandoned |
Array
(
[id] => 9798208
[patent_doc_number] => 20150010147
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-08
[patent_title] => 'CRYPTOGRAPHIC SYSTEM, CRYPTOGRAPHIC METHOD, AND CRYPTOGRAPHIC PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 14/376147
[patent_app_country] => US
[patent_app_date] => 2013-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 41
[patent_figures_cnt] => 41
[patent_no_of_words] => 31071
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14376147
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/376147 | Cryptographic system, cryptographic method, and cryptographic program | Feb 28, 2013 | Issued |
Array
(
[id] => 10526647
[patent_doc_number] => 09253174
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-02-02
[patent_title] => 'Providing a second factor authorization'
[patent_app_type] => utility
[patent_app_number] => 13/781484
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4128
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13781484
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/781484 | Providing a second factor authorization | Feb 27, 2013 | Issued |
Array
(
[id] => 10011496
[patent_doc_number] => 09055036
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-09
[patent_title] => 'Method and apparatus for transmitting a user datagram protocol message that is larger than a defined size'
[patent_app_type] => utility
[patent_app_number] => 13/780378
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4293
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780378
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/780378 | Method and apparatus for transmitting a user datagram protocol message that is larger than a defined size | Feb 27, 2013 | Issued |
Array
(
[id] => 10486028
[patent_doc_number] => 20150371047
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-24
[patent_title] => 'DETERMINING COVERAGE OF DYNAMIC SECURITY SCANS USING RUNTIME AND STATIC CODE ANALYSES'
[patent_app_type] => utility
[patent_app_number] => 14/764280
[patent_app_country] => US
[patent_app_date] => 2013-02-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5158
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14764280
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/764280 | Determining coverage of dynamic security scans using runtime and static code analyses | Feb 27, 2013 | Issued |
Array
(
[id] => 9645394
[patent_doc_number] => 20140223507
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-07
[patent_title] => 'CLOUD-BASED SECURITY POLICY CONFIGURATION'
[patent_app_type] => utility
[patent_app_number] => 13/759392
[patent_app_country] => US
[patent_app_date] => 2013-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10000
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13759392
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/759392 | Cloud-based security policy configuration | Feb 4, 2013 | Issued |
Array
(
[id] => 9645453
[patent_doc_number] => 20140223566
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-07
[patent_title] => 'SYSTEM AND METHOD FOR AUTOMATIC GENERATION OF HEURISTIC ALGORITHMS FOR MALICIOUS OBJECT IDENTIFICATION'
[patent_app_type] => utility
[patent_app_number] => 13/756685
[patent_app_country] => US
[patent_app_date] => 2013-02-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5970
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13756685
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/756685 | System and method for automatic generation of heuristic algorithms for malicious object identification | Jan 31, 2013 | Issued |
Array
(
[id] => 8953084
[patent_doc_number] => 20130198865
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-01
[patent_title] => 'TRANSMISSION APPARATUS, TRANSMISSION METHOD, AND RECORDING MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 13/752764
[patent_app_country] => US
[patent_app_date] => 2013-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 8334
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13752764
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/752764 | Transmission apparatus, transmission method, and recording medium | Jan 28, 2013 | Issued |
Array
(
[id] => 11392613
[patent_doc_number] => 09553869
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-24
[patent_title] => 'Method for initializing a memory area that is associated with a smart meter'
[patent_app_type] => utility
[patent_app_number] => 14/376660
[patent_app_country] => US
[patent_app_date] => 2013-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 10758
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 154
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14376660
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/376660 | Method for initializing a memory area that is associated with a smart meter | Jan 17, 2013 | Issued |
Array
(
[id] => 9479758
[patent_doc_number] => 20140137221
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-15
[patent_title] => 'IMAGE META DATA DRIVEN DEVICE AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 13/676556
[patent_app_country] => US
[patent_app_date] => 2012-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3096
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13676556
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/676556 | IMAGE META DATA DRIVEN DEVICE AUTHENTICATION | Nov 13, 2012 | Abandoned |
Array
(
[id] => 11234985
[patent_doc_number] => 09462232
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-04
[patent_title] => 'System and method of managing protected video content'
[patent_app_type] => utility
[patent_app_number] => 13/649893
[patent_app_country] => US
[patent_app_date] => 2012-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5456
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13649893
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/649893 | System and method of managing protected video content | Oct 10, 2012 | Issued |
Array
(
[id] => 10067779
[patent_doc_number] => 09106646
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-08-11
[patent_title] => 'Enhanced multi-factor authentication'
[patent_app_type] => utility
[patent_app_number] => 13/613841
[patent_app_country] => US
[patent_app_date] => 2012-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8600
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 238
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13613841
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/613841 | Enhanced multi-factor authentication | Sep 12, 2012 | Issued |
Array
(
[id] => 9841203
[patent_doc_number] => 20150033285
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'NON-INTRUSIVE METHOD AND APPARATUS FOR AUTOMATICALLY DISPATCHING SECURITY RULES IN CLOUD ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/353053
[patent_app_country] => US
[patent_app_date] => 2012-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8613
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14353053
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/353053 | Non-intrusive method and apparatus for automatically dispatching security rules in cloud environment | Sep 11, 2012 | Issued |
Array
(
[id] => 10513411
[patent_doc_number] => 09240993
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-01-19
[patent_title] => 'Method and system for in-field recovery of security when a certificate authority has been compromised'
[patent_app_type] => utility
[patent_app_number] => 13/609319
[patent_app_country] => US
[patent_app_date] => 2012-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 2166
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13609319
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/609319 | Method and system for in-field recovery of security when a certificate authority has been compromised | Sep 10, 2012 | Issued |
Array
(
[id] => 10034695
[patent_doc_number] => 09076016
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-07
[patent_title] => 'Anonymization as a service'
[patent_app_type] => utility
[patent_app_number] => 13/589239
[patent_app_country] => US
[patent_app_date] => 2012-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6827
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13589239
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/589239 | Anonymization as a service | Aug 19, 2012 | Issued |
Array
(
[id] => 9264910
[patent_doc_number] => 20130346839
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-26
[patent_title] => 'PRIVATE TUNNEL NETWORK PORTAL'
[patent_app_type] => utility
[patent_app_number] => 13/562111
[patent_app_country] => US
[patent_app_date] => 2012-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5114
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13562111
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/562111 | PRIVATE TUNNEL NETWORK PORTAL | Jul 29, 2012 | Abandoned |
Array
(
[id] => 10085530
[patent_doc_number] => 09122878
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-01
[patent_title] => 'Software license management with drifting component'
[patent_app_type] => utility
[patent_app_number] => 13/535834
[patent_app_country] => US
[patent_app_date] => 2012-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 7207
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13535834
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/535834 | Software license management with drifting component | Jun 27, 2012 | Issued |
Array
(
[id] => 8467165
[patent_doc_number] => 20120272333
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-25
[patent_title] => 'METHODS, DATA PROCESSING SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR ASSIGNING PRIVACY LEVELS TO DATA ELEMENTS'
[patent_app_type] => utility
[patent_app_number] => 13/536436
[patent_app_country] => US
[patent_app_date] => 2012-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3795
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13536436
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/536436 | Methods, data processing systems, and computer program products for assigning privacy levels to data elements | Jun 27, 2012 | Issued |