
Sayed Aresh Beheshti Shirazi
Examiner (ID: 11907, Phone: (571)270-3396 , Office: P/2435 )
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435, IPBS, CD |
| Total Applications | 451 |
| Issued Applications | 351 |
| Pending Applications | 3 |
| Abandoned Applications | 96 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9252005
[patent_doc_number] => 08615796
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-12-24
[patent_title] => 'Managing resource allocations'
[patent_app_type] => utility
[patent_app_number] => 12/512884
[patent_app_country] => US
[patent_app_date] => 2009-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 19
[patent_no_of_words] => 10710
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12512884
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/512884 | Managing resource allocations | Jul 29, 2009 | Issued |
Array
(
[id] => 6640027
[patent_doc_number] => 20100005300
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-01-07
[patent_title] => 'METHOD IN A PEER FOR AUTHENTICATING THE PEER TO AN AUTHENTICATOR, CORRESPONDING DEVICE, AND COMPUTER PROGRAM PRODUCT THEREFORE'
[patent_app_type] => utility
[patent_app_number] => 12/496812
[patent_app_country] => US
[patent_app_date] => 2009-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3276
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0005/20100005300.pdf
[firstpage_image] =>[orig_patent_app_number] => 12496812
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/496812 | METHOD IN A PEER FOR AUTHENTICATING THE PEER TO AN AUTHENTICATOR, CORRESPONDING DEVICE, AND COMPUTER PROGRAM PRODUCT THEREFORE | Jul 1, 2009 | Abandoned |
Array
(
[id] => 6637063
[patent_doc_number] => 20100325705
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-23
[patent_title] => 'Systems and Methods for A2A and A2DB Security Using Program Authentication Factors'
[patent_app_type] => utility
[patent_app_number] => 12/497429
[patent_app_country] => US
[patent_app_date] => 2009-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10386
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0325/20100325705.pdf
[firstpage_image] =>[orig_patent_app_number] => 12497429
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/497429 | Systems and methods for A2A and A2DB security using program authentication factors | Jul 1, 2009 | Issued |
Array
(
[id] => 10003350
[patent_doc_number] => 09047445
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-06-02
[patent_title] => 'Memory device and method for updating a security module'
[patent_app_type] => utility
[patent_app_number] => 12/495389
[patent_app_country] => US
[patent_app_date] => 2009-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4593
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 319
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12495389
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/495389 | Memory device and method for updating a security module | Jun 29, 2009 | Issued |
Array
(
[id] => 8423552
[patent_doc_number] => 08280044
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-10-02
[patent_title] => 'Stream encryption method and encryption system'
[patent_app_type] => utility
[patent_app_number] => 12/492841
[patent_app_country] => US
[patent_app_date] => 2009-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6115
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 214
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12492841
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/492841 | Stream encryption method and encryption system | Jun 25, 2009 | Issued |
Array
(
[id] => 6365892
[patent_doc_number] => 20100333187
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-12-30
[patent_title] => 'SUBSCRIBER BASED POLICY FOR SERVICE NETWORK GATEWAYS'
[patent_app_type] => utility
[patent_app_number] => 12/492522
[patent_app_country] => US
[patent_app_date] => 2009-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 1441
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0333/20100333187.pdf
[firstpage_image] =>[orig_patent_app_number] => 12492522
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/492522 | Subscriber based policy for service network gateways | Jun 25, 2009 | Issued |
Array
(
[id] => 5468117
[patent_doc_number] => 20090328202
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-31
[patent_title] => 'MOBILE TERMINAL DEVICE, METHOD OF ACTIVATING TERMINAL APPARATUS FUNCTION AND COMPUTER READABLE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 12/492097
[patent_app_country] => US
[patent_app_date] => 2009-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6058
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0328/20090328202.pdf
[firstpage_image] =>[orig_patent_app_number] => 12492097
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/492097 | MOBILE TERMINAL DEVICE, METHOD OF ACTIVATING TERMINAL APPARATUS FUNCTION AND COMPUTER READABLE MEDIUM | Jun 24, 2009 | Abandoned |
Array
(
[id] => 5516727
[patent_doc_number] => 20090217034
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-08-27
[patent_title] => 'Multi-step digital signature method and system'
[patent_app_type] => utility
[patent_app_number] => 12/382721
[patent_app_country] => US
[patent_app_date] => 2009-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 16249
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0217/20090217034.pdf
[firstpage_image] =>[orig_patent_app_number] => 12382721
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/382721 | Multi-step digital signature method and system | Mar 22, 2009 | Issued |
Array
(
[id] => 6568024
[patent_doc_number] => 20100128802
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-05-27
[patent_title] => 'VIDEO PROCESSING CIUCUIT AND RELATED METHOD FOR MERGING VIDEO OUTPUT STREAMS WITH GRAPHICAL STREAM FOR TRANSMISSION'
[patent_app_type] => utility
[patent_app_number] => 12/276422
[patent_app_country] => US
[patent_app_date] => 2008-11-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7180
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0128/20100128802.pdf
[firstpage_image] =>[orig_patent_app_number] => 12276422
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/276422 | VIDEO PROCESSING CIUCUIT AND RELATED METHOD FOR MERGING VIDEO OUTPUT STREAMS WITH GRAPHICAL STREAM FOR TRANSMISSION | Nov 23, 2008 | Abandoned |
Array
(
[id] => 5277458
[patent_doc_number] => 20090129590
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-05-21
[patent_title] => 'COMMON KEY GENERATION SYSTEM, COMMON KEY GENERATION METHOD AND NODE USING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 12/260203
[patent_app_country] => US
[patent_app_date] => 2008-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8204
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0129/20090129590.pdf
[firstpage_image] =>[orig_patent_app_number] => 12260203
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/260203 | Common key generation system, common key generation method and node using the same | Oct 28, 2008 | Issued |
Array
(
[id] => 8702897
[patent_doc_number] => 08396125
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-03-12
[patent_title] => 'Picture coding apparatus and picture coding method'
[patent_app_type] => utility
[patent_app_number] => 12/252593
[patent_app_country] => US
[patent_app_date] => 2008-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 14
[patent_no_of_words] => 13117
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 257
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12252593
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/252593 | Picture coding apparatus and picture coding method | Oct 15, 2008 | Issued |
Array
(
[id] => 6511179
[patent_doc_number] => 20100095117
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-15
[patent_title] => 'SECURE AND POSITIVE AUTHENTICATION ACROSS A NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/252248
[patent_app_country] => US
[patent_app_date] => 2008-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4964
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0095/20100095117.pdf
[firstpage_image] =>[orig_patent_app_number] => 12252248
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/252248 | SECURE AND POSITIVE AUTHENTICATION ACROSS A NETWORK | Oct 14, 2008 | Abandoned |
Array
(
[id] => 10133652
[patent_doc_number] => 09167505
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-20
[patent_title] => 'Access management for wireless communication'
[patent_app_type] => utility
[patent_app_number] => 12/246383
[patent_app_country] => US
[patent_app_date] => 2008-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 28
[patent_no_of_words] => 23083
[patent_no_of_claims] => 77
[patent_no_of_ind_claims] => 16
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12246383
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/246383 | Access management for wireless communication | Oct 5, 2008 | Issued |
Array
(
[id] => 8308957
[patent_doc_number] => 08230510
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-07-24
[patent_title] => 'Scanning computer data for malicious codes using a remote server computer'
[patent_app_type] => utility
[patent_app_number] => 12/244584
[patent_app_country] => US
[patent_app_date] => 2008-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5644
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12244584
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/244584 | Scanning computer data for malicious codes using a remote server computer | Oct 1, 2008 | Issued |
Array
(
[id] => 10895240
[patent_doc_number] => 08918872
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-23
[patent_title] => 'System, method, and computer program product for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device'
[patent_app_type] => utility
[patent_app_number] => 12/163417
[patent_app_country] => US
[patent_app_date] => 2008-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5165
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 317
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12163417
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/163417 | System, method, and computer program product for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device | Jun 26, 2008 | Issued |
Array
(
[id] => 5467496
[patent_doc_number] => 20090327696
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-31
[patent_title] => 'AUTHENTICATION WITH AN UNTRUSTED ROOT'
[patent_app_type] => utility
[patent_app_number] => 12/163458
[patent_app_country] => US
[patent_app_date] => 2008-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5551
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0327/20090327696.pdf
[firstpage_image] =>[orig_patent_app_number] => 12163458
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/163458 | Authentication with an untrusted root | Jun 26, 2008 | Issued |
Array
(
[id] => 5467502
[patent_doc_number] => 20090327702
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-31
[patent_title] => 'Key Escrow Service'
[patent_app_type] => utility
[patent_app_number] => 12/163681
[patent_app_country] => US
[patent_app_date] => 2008-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7162
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0327/20090327702.pdf
[firstpage_image] =>[orig_patent_app_number] => 12163681
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/163681 | Key Escrow Service | Jun 26, 2008 | Abandoned |
Array
(
[id] => 5467984
[patent_doc_number] => 20090328147
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-31
[patent_title] => 'EAP BASED CAPABILITY NEGOTIATION AND FACILITATION FOR TUNNELING EAP METHODS'
[patent_app_type] => utility
[patent_app_number] => 12/163540
[patent_app_country] => US
[patent_app_date] => 2008-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5810
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0328/20090328147.pdf
[firstpage_image] =>[orig_patent_app_number] => 12163540
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/163540 | EAP BASED CAPABILITY NEGOTIATION AND FACILITATION FOR TUNNELING EAP METHODS | Jun 26, 2008 | Abandoned |
Array
(
[id] => 9377710
[patent_doc_number] => 08681984
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-25
[patent_title] => 'Context-aware based RFID privacy control system and personal privacy protection method using the same'
[patent_app_type] => utility
[patent_app_number] => 12/142016
[patent_app_country] => US
[patent_app_date] => 2008-06-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5943
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12142016
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/142016 | Context-aware based RFID privacy control system and personal privacy protection method using the same | Jun 18, 2008 | Issued |
Array
(
[id] => 10854571
[patent_doc_number] => 08881284
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-11-04
[patent_title] => 'Method and system for secure network access using a virtual machine'
[patent_app_type] => utility
[patent_app_number] => 12/140037
[patent_app_country] => US
[patent_app_date] => 2008-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9699
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12140037
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/140037 | Method and system for secure network access using a virtual machine | Jun 15, 2008 | Issued |