Search

Helai Salehi

Examiner (ID: 3794, Phone: (571)270-7468 , Office: P/2433 )

Most Active Art Unit
2433
Art Unit(s)
2433
Total Applications
564
Issued Applications
393
Pending Applications
41
Abandoned Applications
140

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 4621872 [patent_doc_number] => 08001603 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2011-08-16 [patent_title] => 'Variable scan of files based on file context' [patent_app_type] => utility [patent_app_number] => 11/492290 [patent_app_country] => US [patent_app_date] => 2006-07-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5535 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 261 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/001/08001603.pdf [firstpage_image] =>[orig_patent_app_number] => 11492290 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/492290
Variable scan of files based on file context Jul 23, 2006 Issued
Array ( [id] => 4911350 [patent_doc_number] => 20080022117 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-01-24 [patent_title] => 'Enabling access to more than one encrypted data segment of a segmentable data stream' [patent_app_type] => utility [patent_app_number] => 11/492230 [patent_app_country] => US [patent_app_date] => 2006-07-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5879 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0022/20080022117.pdf [firstpage_image] =>[orig_patent_app_number] => 11492230 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/492230
Enabling access to more than one encrypted data segment of a segmentable data stream Jul 20, 2006 Abandoned
Array ( [id] => 5309253 [patent_doc_number] => 20090016534 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-15 [patent_title] => 'METHOD AND SYSTEM OF GENERATING IMMUTABLE AUDIT LOGS' [patent_app_type] => utility [patent_app_number] => 12/096048 [patent_app_country] => US [patent_app_date] => 2006-07-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3169 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0016/20090016534.pdf [firstpage_image] =>[orig_patent_app_number] => 12096048 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/096048
Method and system of generating immutable audit logs Jul 13, 2006 Issued
Array ( [id] => 5198283 [patent_doc_number] => 20070297601 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-12-27 [patent_title] => 'Modular reduction using folding' [patent_app_type] => utility [patent_app_number] => 11/476432 [patent_app_country] => US [patent_app_date] => 2006-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 4355 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0297/20070297601.pdf [firstpage_image] =>[orig_patent_app_number] => 11476432 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/476432
Modular reduction using folding Jun 26, 2006 Issued
Array ( [id] => 4911348 [patent_doc_number] => 20080022115 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-01-24 [patent_title] => 'METHOD AND SYSTEM FOR ELECTRONIC GRAFFITI' [patent_app_type] => utility [patent_app_number] => 11/421252 [patent_app_country] => US [patent_app_date] => 2006-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 3438 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0022/20080022115.pdf [firstpage_image] =>[orig_patent_app_number] => 11421252 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/421252
METHOD AND SYSTEM FOR ELECTRONIC GRAFFITI May 30, 2006 Abandoned
Array ( [id] => 96901 [patent_doc_number] => 07734912 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-06-08 [patent_title] => 'Secure login using single factor split key asymmetric cryptography and an augmenting factor' [patent_app_type] => utility [patent_app_number] => 11/421088 [patent_app_country] => US [patent_app_date] => 2006-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 28473 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 285 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/734/07734912.pdf [firstpage_image] =>[orig_patent_app_number] => 11421088 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/421088
Secure login using single factor split key asymmetric cryptography and an augmenting factor May 30, 2006 Issued
Array ( [id] => 9062842 [patent_doc_number] => 08549295 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-10-01 [patent_title] => 'Establishing secure, mutually authenticated communication credentials' [patent_app_type] => utility [patent_app_number] => 11/421341 [patent_app_country] => US [patent_app_date] => 2006-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5010 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 385 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11421341 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/421341
Establishing secure, mutually authenticated communication credentials May 30, 2006 Issued
Array ( [id] => 96898 [patent_doc_number] => 07734911 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2010-06-08 [patent_title] => 'Secure login using augmented single factor split key asymmetric cryptography' [patent_app_type] => utility [patent_app_number] => 11/421080 [patent_app_country] => US [patent_app_date] => 2006-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 28349 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 299 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/734/07734911.pdf [firstpage_image] =>[orig_patent_app_number] => 11421080 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/421080
Secure login using augmented single factor split key asymmetric cryptography May 30, 2006 Issued
Array ( [id] => 8775420 [patent_doc_number] => 08429396 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-04-23 [patent_title] => 'Peer discovery and secure communication in failover schemes' [patent_app_type] => utility [patent_app_number] => 11/421386 [patent_app_country] => US [patent_app_date] => 2006-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 4137 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 259 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11421386 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/421386
Peer discovery and secure communication in failover schemes May 30, 2006 Issued
Array ( [id] => 5208598 [patent_doc_number] => 20070247182 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-10-25 [patent_title] => 'Protection of security key information' [patent_app_type] => utility [patent_app_number] => 11/395871 [patent_app_country] => US [patent_app_date] => 2006-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3747 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0247/20070247182.pdf [firstpage_image] =>[orig_patent_app_number] => 11395871 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/395871
Protection of security key information Mar 30, 2006 Abandoned
Array ( [id] => 7552262 [patent_doc_number] => 08064601 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2011-11-22 [patent_title] => 'Security in wireless communication systems' [patent_app_type] => utility [patent_app_number] => 11/396400 [patent_app_country] => US [patent_app_date] => 2006-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4844 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 90 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/064/08064601.pdf [firstpage_image] =>[orig_patent_app_number] => 11396400 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/396400
Security in wireless communication systems Mar 30, 2006 Issued
Array ( [id] => 5184679 [patent_doc_number] => 20070056033 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-03-08 [patent_title] => 'Platform configuration apparatus, systems, and methods' [patent_app_type] => utility [patent_app_number] => 11/396266 [patent_app_country] => US [patent_app_date] => 2006-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4900 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0056/20070056033.pdf [firstpage_image] =>[orig_patent_app_number] => 11396266 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/396266
Platform configuration apparatus, systems, and methods Mar 30, 2006 Abandoned
Array ( [id] => 7689615 [patent_doc_number] => 20070234418 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-10-04 [patent_title] => 'Method and apparatus of remote access message differentiation in VPN endpoint routers' [patent_app_type] => utility [patent_app_number] => 11/396020 [patent_app_country] => US [patent_app_date] => 2006-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2954 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0234/20070234418.pdf [firstpage_image] =>[orig_patent_app_number] => 11396020 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/396020
Method and apparatus of remote access message differentiation in VPN endpoint routers Mar 29, 2006 Abandoned
Array ( [id] => 8389014 [patent_doc_number] => 08266424 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-09-11 [patent_title] => 'Method and system for in-field recovery of security when a certificate authority has been compromised' [patent_app_type] => utility [patent_app_number] => 11/395588 [patent_app_country] => US [patent_app_date] => 2006-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 1 [patent_no_of_words] => 2112 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11395588 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/395588
Method and system for in-field recovery of security when a certificate authority has been compromised Mar 29, 2006 Issued
Array ( [id] => 9680893 [patent_doc_number] => 08819822 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-08-26 [patent_title] => 'Security method for detecting intrusions that exploit misinterpretation of supplied data' [patent_app_type] => utility [patent_app_number] => 11/395817 [patent_app_country] => US [patent_app_date] => 2006-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 10702 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 152 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11395817 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/395817
Security method for detecting intrusions that exploit misinterpretation of supplied data Mar 29, 2006 Issued
Array ( [id] => 5850177 [patent_doc_number] => 20060233368 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2006-10-19 [patent_title] => 'Method for conditional access in a DMTS/DOCSIS enabled set top box environment' [patent_app_type] => utility [patent_app_number] => 11/395589 [patent_app_country] => US [patent_app_date] => 2006-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2093 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0233/20060233368.pdf [firstpage_image] =>[orig_patent_app_number] => 11395589 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/395589
Method for conditional access in a DMTS/DOCSIS enabled set top box environment Mar 29, 2006 Abandoned
Array ( [id] => 7547927 [patent_doc_number] => 08055908 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-11-08 [patent_title] => 'Data transmission method and electronic device using the same' [patent_app_type] => utility [patent_app_number] => 11/391030 [patent_app_country] => US [patent_app_date] => 2006-03-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 4469 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 269 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/055/08055908.pdf [firstpage_image] =>[orig_patent_app_number] => 11391030 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/391030
Data transmission method and electronic device using the same Mar 27, 2006 Issued
Array ( [id] => 10137836 [patent_doc_number] => 09171157 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-27 [patent_title] => 'Method and system for tracking access to application data and preventing data exploitation by malicious programs' [patent_app_type] => utility [patent_app_number] => 11/391017 [patent_app_country] => US [patent_app_date] => 2006-03-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 7 [patent_no_of_words] => 4842 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 363 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11391017 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/391017
Method and system for tracking access to application data and preventing data exploitation by malicious programs Mar 27, 2006 Issued
Array ( [id] => 5065164 [patent_doc_number] => 20070226806 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2007-09-27 [patent_title] => 'Method and apparatus for enhancing cryptographic engines against security attacks' [patent_app_type] => utility [patent_app_number] => 11/390949 [patent_app_country] => US [patent_app_date] => 2006-03-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4539 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0226/20070226806.pdf [firstpage_image] =>[orig_patent_app_number] => 11390949 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/390949
Method and apparatus for enhancing cryptographic engines against security attacks Mar 26, 2006 Abandoned
Array ( [id] => 8861775 [patent_doc_number] => 08464329 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-06-11 [patent_title] => 'System and method for providing security for SIP-based communications' [patent_app_type] => utility [patent_app_number] => 11/357164 [patent_app_country] => US [patent_app_date] => 2006-02-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4092 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 133 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11357164 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/357164
System and method for providing security for SIP-based communications Feb 20, 2006 Issued
Menu