
Sayed Aresh Beheshti Shirazi
Examiner (ID: 11907, Phone: (571)270-3396 , Office: P/2435 )
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435, IPBS, CD |
| Total Applications | 451 |
| Issued Applications | 351 |
| Pending Applications | 3 |
| Abandoned Applications | 96 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 7658667
[patent_doc_number] => 20110307936
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-15
[patent_title] => 'NETWORK ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 13/158031
[patent_app_country] => US
[patent_app_date] => 2011-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5097
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0307/20110307936.pdf
[firstpage_image] =>[orig_patent_app_number] => 13158031
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/158031 | NETWORK ANALYSIS | Jun 9, 2011 | Abandoned |
Array
(
[id] => 8918332
[patent_doc_number] => 20130179957
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-11
[patent_title] => 'PERSONAL IDENTIFICATION SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/805628
[patent_app_country] => US
[patent_app_date] => 2011-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 12063
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13805628
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/805628 | PERSONAL IDENTIFICATION SYSTEM AND METHOD | May 15, 2011 | Abandoned |
Array
(
[id] => 8097891
[patent_doc_number] => 20120084544
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-05
[patent_title] => 'METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS BETWEEN A SECURE VIRTUAL TERMINAL AND A REMOTE SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/105154
[patent_app_country] => US
[patent_app_date] => 2011-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 26
[patent_figures_cnt] => 26
[patent_no_of_words] => 23074
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0084/20120084544.pdf
[firstpage_image] =>[orig_patent_app_number] => 13105154
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/105154 | METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS BETWEEN A SECURE VIRTUAL TERMINAL AND A REMOTE SYSTEM | May 10, 2011 | Abandoned |
Array
(
[id] => 7588842
[patent_doc_number] => 20110283353
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-17
[patent_title] => 'Method and a device for generating a secret value'
[patent_app_type] => utility
[patent_app_number] => 13/068357
[patent_app_country] => US
[patent_app_date] => 2011-05-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3658
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0283/20110283353.pdf
[firstpage_image] =>[orig_patent_app_number] => 13068357
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/068357 | Method and a device for generating a secret value | May 8, 2011 | Issued |
Array
(
[id] => 8433110
[patent_doc_number] => 20120254985
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-10-04
[patent_title] => 'Providing greater access to one or more items in response to determining device transfer'
[patent_app_type] => utility
[patent_app_number] => 13/066917
[patent_app_country] => US
[patent_app_date] => 2011-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 27
[patent_figures_cnt] => 27
[patent_no_of_words] => 35554
[patent_no_of_claims] => 62
[patent_no_of_ind_claims] => 21
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13066917
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/066917 | Providing greater access to one or more items in response to determining device transfer | Apr 25, 2011 | Issued |
Array
(
[id] => 7770416
[patent_doc_number] => 20120036371
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-09
[patent_title] => 'Protection from cryptoanalytic side-channel attacks'
[patent_app_type] => utility
[patent_app_number] => 13/066840
[patent_app_country] => US
[patent_app_date] => 2011-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2304
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0036/20120036371.pdf
[firstpage_image] =>[orig_patent_app_number] => 13066840
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/066840 | Protection from cryptoanalytic side-channel attacks | Apr 24, 2011 | Abandoned |
Array
(
[id] => 9063188
[patent_doc_number] => 08549643
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-10-01
[patent_title] => 'Using decoys by a data loss prevention system to protect against unscripted activity'
[patent_app_type] => utility
[patent_app_number] => 13/066013
[patent_app_country] => US
[patent_app_date] => 2011-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 14101
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 70
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13066013
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/066013 | Using decoys by a data loss prevention system to protect against unscripted activity | Apr 3, 2011 | Issued |
Array
(
[id] => 9137511
[patent_doc_number] => 20130298226
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-07
[patent_title] => 'Method and Terminal for Locking/Unlocking Terminal Screen Based on RFID'
[patent_app_type] => utility
[patent_app_number] => 13/976412
[patent_app_country] => US
[patent_app_date] => 2011-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3786
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13976412
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/976412 | Method and Terminal for Locking/Unlocking Terminal Screen Based on RFID | Apr 1, 2011 | Abandoned |
Array
(
[id] => 8046471
[patent_doc_number] => 20120072975
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-03-22
[patent_title] => 'Circumstantial Authentication'
[patent_app_type] => utility
[patent_app_number] => 13/052967
[patent_app_country] => US
[patent_app_date] => 2011-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7703
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0072/20120072975.pdf
[firstpage_image] =>[orig_patent_app_number] => 13052967
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/052967 | Circumstantial Authentication | Mar 20, 2011 | Abandoned |
Array
(
[id] => 9985505
[patent_doc_number] => 09031234
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-12
[patent_title] => 'Encryption device and decryption device'
[patent_app_type] => utility
[patent_app_number] => 13/050165
[patent_app_country] => US
[patent_app_date] => 2011-03-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 24
[patent_no_of_words] => 6563
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13050165
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/050165 | Encryption device and decryption device | Mar 16, 2011 | Issued |
Array
(
[id] => 5976485
[patent_doc_number] => 20110154025
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-23
[patent_title] => 'COMPUTER IMPLEMENTED METHOD FOR AUTHENTICATING A USER'
[patent_app_type] => utility
[patent_app_number] => 12/904388
[patent_app_country] => US
[patent_app_date] => 2010-11-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8954
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0154/20110154025.pdf
[firstpage_image] =>[orig_patent_app_number] => 12904388
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/904388 | Computer implemented method for authenticating a user | Nov 2, 2010 | Issued |
Array
(
[id] => 9417110
[patent_doc_number] => 08701162
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-04-15
[patent_title] => 'Method and system for detecting and countering malware in a computer'
[patent_app_type] => utility
[patent_app_number] => 12/917550
[patent_app_country] => US
[patent_app_date] => 2010-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 15
[patent_no_of_words] => 9161
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12917550
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/917550 | Method and system for detecting and countering malware in a computer | Nov 1, 2010 | Issued |
Array
(
[id] => 8157662
[patent_doc_number] => 20120099728
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-26
[patent_title] => 'Protocol Based Key Management'
[patent_app_type] => utility
[patent_app_number] => 12/910905
[patent_app_country] => US
[patent_app_date] => 2010-10-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5830
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0099/20120099728.pdf
[firstpage_image] =>[orig_patent_app_number] => 12910905
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/910905 | Protocol based key management | Oct 24, 2010 | Issued |
Array
(
[id] => 8144023
[patent_doc_number] => 20120096559
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-19
[patent_title] => 'CANCELLING DIGITAL SIGNATURES FOR FORM FILES'
[patent_app_type] => utility
[patent_app_number] => 12/905956
[patent_app_country] => US
[patent_app_date] => 2010-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 14417
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0096/20120096559.pdf
[firstpage_image] =>[orig_patent_app_number] => 12905956
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/905956 | Cancelling digital signatures for form files | Oct 14, 2010 | Issued |
Array
(
[id] => 7760346
[patent_doc_number] => 20120030765
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-02
[patent_title] => 'OPERATION METHOD OF AN ANTI-VIRUS STORAGE DEVICE HAVING A STORAGE DISK AND A READ-ONLY MEMORY'
[patent_app_type] => utility
[patent_app_number] => 12/903228
[patent_app_country] => US
[patent_app_date] => 2010-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2333
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0030/20120030765.pdf
[firstpage_image] =>[orig_patent_app_number] => 12903228
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/903228 | OPERATION METHOD OF AN ANTI-VIRUS STORAGE DEVICE HAVING A STORAGE DISK AND A READ-ONLY MEMORY | Oct 12, 2010 | Abandoned |
Array
(
[id] => 8918346
[patent_doc_number] => 20130179971
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-07-11
[patent_title] => 'Virtual Machines'
[patent_app_type] => utility
[patent_app_number] => 13/822239
[patent_app_country] => US
[patent_app_date] => 2010-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7736
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13822239
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/822239 | Virtual Machines | Sep 29, 2010 | |
Array
(
[id] => 8326134
[patent_doc_number] => 20120198539
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-08-02
[patent_title] => 'Service Access Method, System and Device Based on WLAN Access Authentication'
[patent_app_type] => utility
[patent_app_number] => 13/393162
[patent_app_country] => US
[patent_app_date] => 2010-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 12793
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 11
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13393162
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/393162 | Service Access Method, System and Device Based on WLAN Access Authentication | Aug 30, 2010 | Abandoned |
Array
(
[id] => 9077746
[patent_doc_number] => 08555338
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-10-08
[patent_title] => 'Apparatus and method for retrieving a boarding pass'
[patent_app_type] => utility
[patent_app_number] => 12/853309
[patent_app_country] => US
[patent_app_date] => 2010-08-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 4320
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12853309
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/853309 | Apparatus and method for retrieving a boarding pass | Aug 9, 2010 | Issued |
Array
(
[id] => 9781322
[patent_doc_number] => 08856544
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-10-07
[patent_title] => 'System and method for providing secure virtual machines'
[patent_app_type] => utility
[patent_app_number] => 13/379398
[patent_app_country] => US
[patent_app_date] => 2010-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 6
[patent_no_of_words] => 5166
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 215
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13379398
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/379398 | System and method for providing secure virtual machines | Jul 15, 2010 | Issued |
Array
(
[id] => 11345602
[patent_doc_number] => 09530011
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-27
[patent_title] => 'Method and system for provision of cryptographic services'
[patent_app_type] => utility
[patent_app_number] => 13/379736
[patent_app_country] => US
[patent_app_date] => 2010-06-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 13160
[patent_no_of_claims] => 41
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13379736
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/379736 | Method and system for provision of cryptographic services | Jun 21, 2010 | Issued |