Search

Sayed Aresh Beheshti Shirazi

Examiner (ID: 11907, Phone: (571)270-3396 , Office: P/2435 )

Most Active Art Unit
2435
Art Unit(s)
2435, IPBS, CD
Total Applications
451
Issued Applications
351
Pending Applications
3
Abandoned Applications
96

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 7658667 [patent_doc_number] => 20110307936 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-12-15 [patent_title] => 'NETWORK ANALYSIS' [patent_app_type] => utility [patent_app_number] => 13/158031 [patent_app_country] => US [patent_app_date] => 2011-06-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5097 [patent_no_of_claims] => 34 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0307/20110307936.pdf [firstpage_image] =>[orig_patent_app_number] => 13158031 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/158031
NETWORK ANALYSIS Jun 9, 2011 Abandoned
Array ( [id] => 8918332 [patent_doc_number] => 20130179957 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-07-11 [patent_title] => 'PERSONAL IDENTIFICATION SYSTEM AND METHOD' [patent_app_type] => utility [patent_app_number] => 13/805628 [patent_app_country] => US [patent_app_date] => 2011-05-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 21 [patent_no_of_words] => 12063 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13805628 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/805628
PERSONAL IDENTIFICATION SYSTEM AND METHOD May 15, 2011 Abandoned
Array ( [id] => 8097891 [patent_doc_number] => 20120084544 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-05 [patent_title] => 'METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS BETWEEN A SECURE VIRTUAL TERMINAL AND A REMOTE SYSTEM' [patent_app_type] => utility [patent_app_number] => 13/105154 [patent_app_country] => US [patent_app_date] => 2011-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 26 [patent_figures_cnt] => 26 [patent_no_of_words] => 23074 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0084/20120084544.pdf [firstpage_image] =>[orig_patent_app_number] => 13105154 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/105154
METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS BETWEEN A SECURE VIRTUAL TERMINAL AND A REMOTE SYSTEM May 10, 2011 Abandoned
Array ( [id] => 7588842 [patent_doc_number] => 20110283353 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-11-17 [patent_title] => 'Method and a device for generating a secret value' [patent_app_type] => utility [patent_app_number] => 13/068357 [patent_app_country] => US [patent_app_date] => 2011-05-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3658 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0283/20110283353.pdf [firstpage_image] =>[orig_patent_app_number] => 13068357 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/068357
Method and a device for generating a secret value May 8, 2011 Issued
Array ( [id] => 8433110 [patent_doc_number] => 20120254985 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-10-04 [patent_title] => 'Providing greater access to one or more items in response to determining device transfer' [patent_app_type] => utility [patent_app_number] => 13/066917 [patent_app_country] => US [patent_app_date] => 2011-04-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 27 [patent_figures_cnt] => 27 [patent_no_of_words] => 35554 [patent_no_of_claims] => 62 [patent_no_of_ind_claims] => 21 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13066917 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/066917
Providing greater access to one or more items in response to determining device transfer Apr 25, 2011 Issued
Array ( [id] => 7770416 [patent_doc_number] => 20120036371 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-02-09 [patent_title] => 'Protection from cryptoanalytic side-channel attacks' [patent_app_type] => utility [patent_app_number] => 13/066840 [patent_app_country] => US [patent_app_date] => 2011-04-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2304 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0036/20120036371.pdf [firstpage_image] =>[orig_patent_app_number] => 13066840 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/066840
Protection from cryptoanalytic side-channel attacks Apr 24, 2011 Abandoned
Array ( [id] => 9063188 [patent_doc_number] => 08549643 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-10-01 [patent_title] => 'Using decoys by a data loss prevention system to protect against unscripted activity' [patent_app_type] => utility [patent_app_number] => 13/066013 [patent_app_country] => US [patent_app_date] => 2011-04-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 14101 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 70 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13066013 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/066013
Using decoys by a data loss prevention system to protect against unscripted activity Apr 3, 2011 Issued
Array ( [id] => 9137511 [patent_doc_number] => 20130298226 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-11-07 [patent_title] => 'Method and Terminal for Locking/Unlocking Terminal Screen Based on RFID' [patent_app_type] => utility [patent_app_number] => 13/976412 [patent_app_country] => US [patent_app_date] => 2011-04-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3786 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13976412 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/976412
Method and Terminal for Locking/Unlocking Terminal Screen Based on RFID Apr 1, 2011 Abandoned
Array ( [id] => 8046471 [patent_doc_number] => 20120072975 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-03-22 [patent_title] => 'Circumstantial Authentication' [patent_app_type] => utility [patent_app_number] => 13/052967 [patent_app_country] => US [patent_app_date] => 2011-03-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7703 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0072/20120072975.pdf [firstpage_image] =>[orig_patent_app_number] => 13052967 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/052967
Circumstantial Authentication Mar 20, 2011 Abandoned
Array ( [id] => 9985505 [patent_doc_number] => 09031234 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-05-12 [patent_title] => 'Encryption device and decryption device' [patent_app_type] => utility [patent_app_number] => 13/050165 [patent_app_country] => US [patent_app_date] => 2011-03-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 24 [patent_no_of_words] => 6563 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 245 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13050165 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/050165
Encryption device and decryption device Mar 16, 2011 Issued
Array ( [id] => 5976485 [patent_doc_number] => 20110154025 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-06-23 [patent_title] => 'COMPUTER IMPLEMENTED METHOD FOR AUTHENTICATING A USER' [patent_app_type] => utility [patent_app_number] => 12/904388 [patent_app_country] => US [patent_app_date] => 2010-11-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8954 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0154/20110154025.pdf [firstpage_image] =>[orig_patent_app_number] => 12904388 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/904388
Computer implemented method for authenticating a user Nov 2, 2010 Issued
Array ( [id] => 9417110 [patent_doc_number] => 08701162 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-04-15 [patent_title] => 'Method and system for detecting and countering malware in a computer' [patent_app_type] => utility [patent_app_number] => 12/917550 [patent_app_country] => US [patent_app_date] => 2010-11-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 15 [patent_no_of_words] => 9161 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 203 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12917550 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/917550
Method and system for detecting and countering malware in a computer Nov 1, 2010 Issued
Array ( [id] => 8157662 [patent_doc_number] => 20120099728 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-26 [patent_title] => 'Protocol Based Key Management' [patent_app_type] => utility [patent_app_number] => 12/910905 [patent_app_country] => US [patent_app_date] => 2010-10-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5830 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0099/20120099728.pdf [firstpage_image] =>[orig_patent_app_number] => 12910905 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/910905
Protocol based key management Oct 24, 2010 Issued
Array ( [id] => 8144023 [patent_doc_number] => 20120096559 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-19 [patent_title] => 'CANCELLING DIGITAL SIGNATURES FOR FORM FILES' [patent_app_type] => utility [patent_app_number] => 12/905956 [patent_app_country] => US [patent_app_date] => 2010-10-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 14417 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0096/20120096559.pdf [firstpage_image] =>[orig_patent_app_number] => 12905956 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/905956
Cancelling digital signatures for form files Oct 14, 2010 Issued
Array ( [id] => 7760346 [patent_doc_number] => 20120030765 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-02-02 [patent_title] => 'OPERATION METHOD OF AN ANTI-VIRUS STORAGE DEVICE HAVING A STORAGE DISK AND A READ-ONLY MEMORY' [patent_app_type] => utility [patent_app_number] => 12/903228 [patent_app_country] => US [patent_app_date] => 2010-10-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 2333 [patent_no_of_claims] => 3 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0030/20120030765.pdf [firstpage_image] =>[orig_patent_app_number] => 12903228 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/903228
OPERATION METHOD OF AN ANTI-VIRUS STORAGE DEVICE HAVING A STORAGE DISK AND A READ-ONLY MEMORY Oct 12, 2010 Abandoned
Array ( [id] => 8918346 [patent_doc_number] => 20130179971 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-07-11 [patent_title] => 'Virtual Machines' [patent_app_type] => utility [patent_app_number] => 13/822239 [patent_app_country] => US [patent_app_date] => 2010-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7736 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13822239 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/822239
Virtual Machines Sep 29, 2010
Array ( [id] => 8326134 [patent_doc_number] => 20120198539 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-08-02 [patent_title] => 'Service Access Method, System and Device Based on WLAN Access Authentication' [patent_app_type] => utility [patent_app_number] => 13/393162 [patent_app_country] => US [patent_app_date] => 2010-08-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 12793 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 11 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13393162 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/393162
Service Access Method, System and Device Based on WLAN Access Authentication Aug 30, 2010 Abandoned
Array ( [id] => 9077746 [patent_doc_number] => 08555338 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-10-08 [patent_title] => 'Apparatus and method for retrieving a boarding pass' [patent_app_type] => utility [patent_app_number] => 12/853309 [patent_app_country] => US [patent_app_date] => 2010-08-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 4320 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 221 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12853309 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/853309
Apparatus and method for retrieving a boarding pass Aug 9, 2010 Issued
Array ( [id] => 9781322 [patent_doc_number] => 08856544 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-10-07 [patent_title] => 'System and method for providing secure virtual machines' [patent_app_type] => utility [patent_app_number] => 13/379398 [patent_app_country] => US [patent_app_date] => 2010-07-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 6 [patent_no_of_words] => 5166 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 215 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13379398 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/379398
System and method for providing secure virtual machines Jul 15, 2010 Issued
Array ( [id] => 11345602 [patent_doc_number] => 09530011 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-12-27 [patent_title] => 'Method and system for provision of cryptographic services' [patent_app_type] => utility [patent_app_number] => 13/379736 [patent_app_country] => US [patent_app_date] => 2010-06-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 7 [patent_no_of_words] => 13160 [patent_no_of_claims] => 41 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13379736 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/379736
Method and system for provision of cryptographic services Jun 21, 2010 Issued
Menu