Search

Helai Salehi

Examiner (ID: 4533, Phone: (571)270-7468 , Office: P/2433 )

Most Active Art Unit
2433
Art Unit(s)
2433
Total Applications
554
Issued Applications
388
Pending Applications
46
Abandoned Applications
139

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9852982 [patent_doc_number] => 08954729 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-02-10 [patent_title] => 'Creating and using a specific user unique id for security login authentication' [patent_app_type] => utility [patent_app_number] => 13/789248 [patent_app_country] => US [patent_app_date] => 2013-03-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3442 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 163 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13789248 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/789248
Creating and using a specific user unique id for security login authentication Mar 6, 2013 Issued
Array ( [id] => 9723481 [patent_doc_number] => 20140259182 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-09-11 [patent_title] => 'SYSTEM AND METHOD FOR MANAGING MEDIA CONTENT' [patent_app_type] => utility [patent_app_number] => 13/786684 [patent_app_country] => US [patent_app_date] => 2013-03-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8332 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13786684 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/786684
SYSTEM AND METHOD FOR MANAGING MEDIA CONTENT Mar 5, 2013 Abandoned
Array ( [id] => 9688642 [patent_doc_number] => 20140245408 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-08-28 [patent_title] => 'BIOMETRIC APPROACH TO TRACK CREDENTIALS OF ANONYMOUS USER OF A MOBILE DEVICE' [patent_app_type] => utility [patent_app_number] => 13/783787 [patent_app_country] => US [patent_app_date] => 2013-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2554 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13783787 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/783787
BIOMETRIC APPROACH TO TRACK CREDENTIALS OF ANONYMOUS USER OF A MOBILE DEVICE Mar 3, 2013 Abandoned
Array ( [id] => 9798208 [patent_doc_number] => 20150010147 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-08 [patent_title] => 'CRYPTOGRAPHIC SYSTEM, CRYPTOGRAPHIC METHOD, AND CRYPTOGRAPHIC PROGRAM' [patent_app_type] => utility [patent_app_number] => 14/376147 [patent_app_country] => US [patent_app_date] => 2013-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 41 [patent_figures_cnt] => 41 [patent_no_of_words] => 31071 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14376147 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/376147
Cryptographic system, cryptographic method, and cryptographic program Feb 28, 2013 Issued
Array ( [id] => 10526647 [patent_doc_number] => 09253174 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-02-02 [patent_title] => 'Providing a second factor authorization' [patent_app_type] => utility [patent_app_number] => 13/781484 [patent_app_country] => US [patent_app_date] => 2013-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4128 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 132 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13781484 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/781484
Providing a second factor authorization Feb 27, 2013 Issued
Array ( [id] => 10011496 [patent_doc_number] => 09055036 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-06-09 [patent_title] => 'Method and apparatus for transmitting a user datagram protocol message that is larger than a defined size' [patent_app_type] => utility [patent_app_number] => 13/780378 [patent_app_country] => US [patent_app_date] => 2013-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4293 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13780378 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/780378
Method and apparatus for transmitting a user datagram protocol message that is larger than a defined size Feb 27, 2013 Issued
Array ( [id] => 10486028 [patent_doc_number] => 20150371047 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-24 [patent_title] => 'DETERMINING COVERAGE OF DYNAMIC SECURITY SCANS USING RUNTIME AND STATIC CODE ANALYSES' [patent_app_type] => utility [patent_app_number] => 14/764280 [patent_app_country] => US [patent_app_date] => 2013-02-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5158 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14764280 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/764280
Determining coverage of dynamic security scans using runtime and static code analyses Feb 27, 2013 Issued
Array ( [id] => 9645394 [patent_doc_number] => 20140223507 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-08-07 [patent_title] => 'CLOUD-BASED SECURITY POLICY CONFIGURATION' [patent_app_type] => utility [patent_app_number] => 13/759392 [patent_app_country] => US [patent_app_date] => 2013-02-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10000 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13759392 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/759392
Cloud-based security policy configuration Feb 4, 2013 Issued
Array ( [id] => 9645453 [patent_doc_number] => 20140223566 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-08-07 [patent_title] => 'SYSTEM AND METHOD FOR AUTOMATIC GENERATION OF HEURISTIC ALGORITHMS FOR MALICIOUS OBJECT IDENTIFICATION' [patent_app_type] => utility [patent_app_number] => 13/756685 [patent_app_country] => US [patent_app_date] => 2013-02-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5970 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13756685 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/756685
System and method for automatic generation of heuristic algorithms for malicious object identification Jan 31, 2013 Issued
Array ( [id] => 8953084 [patent_doc_number] => 20130198865 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-08-01 [patent_title] => 'TRANSMISSION APPARATUS, TRANSMISSION METHOD, AND RECORDING MEDIUM' [patent_app_type] => utility [patent_app_number] => 13/752764 [patent_app_country] => US [patent_app_date] => 2013-01-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 8334 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13752764 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/752764
Transmission apparatus, transmission method, and recording medium Jan 28, 2013 Issued
Array ( [id] => 11392613 [patent_doc_number] => 09553869 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-01-24 [patent_title] => 'Method for initializing a memory area that is associated with a smart meter' [patent_app_type] => utility [patent_app_number] => 14/376660 [patent_app_country] => US [patent_app_date] => 2013-01-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 10758 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 154 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14376660 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/376660
Method for initializing a memory area that is associated with a smart meter Jan 17, 2013 Issued
Array ( [id] => 9479758 [patent_doc_number] => 20140137221 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-05-15 [patent_title] => 'IMAGE META DATA DRIVEN DEVICE AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 13/676556 [patent_app_country] => US [patent_app_date] => 2012-11-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3096 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13676556 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/676556
IMAGE META DATA DRIVEN DEVICE AUTHENTICATION Nov 13, 2012 Abandoned
Array ( [id] => 11234985 [patent_doc_number] => 09462232 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-10-04 [patent_title] => 'System and method of managing protected video content' [patent_app_type] => utility [patent_app_number] => 13/649893 [patent_app_country] => US [patent_app_date] => 2012-10-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5456 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 177 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13649893 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/649893
System and method of managing protected video content Oct 10, 2012 Issued
Array ( [id] => 10067779 [patent_doc_number] => 09106646 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-08-11 [patent_title] => 'Enhanced multi-factor authentication' [patent_app_type] => utility [patent_app_number] => 13/613841 [patent_app_country] => US [patent_app_date] => 2012-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 8600 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 238 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13613841 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/613841
Enhanced multi-factor authentication Sep 12, 2012 Issued
Array ( [id] => 9841203 [patent_doc_number] => 20150033285 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-29 [patent_title] => 'NON-INTRUSIVE METHOD AND APPARATUS FOR AUTOMATICALLY DISPATCHING SECURITY RULES IN CLOUD ENVIRONMENT' [patent_app_type] => utility [patent_app_number] => 14/353053 [patent_app_country] => US [patent_app_date] => 2012-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8613 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14353053 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/353053
Non-intrusive method and apparatus for automatically dispatching security rules in cloud environment Sep 11, 2012 Issued
Array ( [id] => 10513411 [patent_doc_number] => 09240993 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-01-19 [patent_title] => 'Method and system for in-field recovery of security when a certificate authority has been compromised' [patent_app_type] => utility [patent_app_number] => 13/609319 [patent_app_country] => US [patent_app_date] => 2012-09-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 1 [patent_no_of_words] => 2166 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 102 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13609319 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/609319
Method and system for in-field recovery of security when a certificate authority has been compromised Sep 10, 2012 Issued
Array ( [id] => 10034695 [patent_doc_number] => 09076016 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-07-07 [patent_title] => 'Anonymization as a service' [patent_app_type] => utility [patent_app_number] => 13/589239 [patent_app_country] => US [patent_app_date] => 2012-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6827 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 210 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13589239 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/589239
Anonymization as a service Aug 19, 2012 Issued
Array ( [id] => 9264910 [patent_doc_number] => 20130346839 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-12-26 [patent_title] => 'PRIVATE TUNNEL NETWORK PORTAL' [patent_app_type] => utility [patent_app_number] => 13/562111 [patent_app_country] => US [patent_app_date] => 2012-07-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5114 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13562111 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/562111
PRIVATE TUNNEL NETWORK PORTAL Jul 29, 2012 Abandoned
Array ( [id] => 10085530 [patent_doc_number] => 09122878 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-09-01 [patent_title] => 'Software license management with drifting component' [patent_app_type] => utility [patent_app_number] => 13/535834 [patent_app_country] => US [patent_app_date] => 2012-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 8 [patent_no_of_words] => 7207 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 197 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13535834 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/535834
Software license management with drifting component Jun 27, 2012 Issued
Array ( [id] => 8467165 [patent_doc_number] => 20120272333 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-10-25 [patent_title] => 'METHODS, DATA PROCESSING SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR ASSIGNING PRIVACY LEVELS TO DATA ELEMENTS' [patent_app_type] => utility [patent_app_number] => 13/536436 [patent_app_country] => US [patent_app_date] => 2012-06-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3795 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13536436 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/536436
Methods, data processing systems, and computer program products for assigning privacy levels to data elements Jun 27, 2012 Issued
Menu