Search

Sayed Aresh Beheshti Shirazi

Examiner (ID: 11907, Phone: (571)270-3396 , Office: P/2435 )

Most Active Art Unit
2435
Art Unit(s)
2435, IPBS, CD
Total Applications
451
Issued Applications
351
Pending Applications
3
Abandoned Applications
96

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 8861511 [patent_doc_number] => 08464065 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-06-11 [patent_title] => 'Procedure and architecture for the protection of real time data' [patent_app_type] => utility [patent_app_number] => 12/602731 [patent_app_country] => US [patent_app_date] => 2008-06-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 4 [patent_no_of_words] => 3365 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 232 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12602731 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/602731
Procedure and architecture for the protection of real time data Jun 9, 2008 Issued
Array ( [id] => 6234737 [patent_doc_number] => 20100186068 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-22 [patent_title] => 'COMMUNICATION APPARATUS, COMMUNICATION CONTROL METHOD, AND PROGRAM' [patent_app_type] => utility [patent_app_number] => 12/602543 [patent_app_country] => US [patent_app_date] => 2008-05-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 9835 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0186/20100186068.pdf [firstpage_image] =>[orig_patent_app_number] => 12602543 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/602543
COMMUNICATION APPARATUS, COMMUNICATION CONTROL METHOD, AND PROGRAM May 15, 2008 Abandoned
Array ( [id] => 5286585 [patent_doc_number] => 20090100260 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-04-16 [patent_title] => 'Location source authentication' [patent_app_type] => utility [patent_app_number] => 12/151476 [patent_app_country] => US [patent_app_date] => 2008-05-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 4888 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0100/20090100260.pdf [firstpage_image] =>[orig_patent_app_number] => 12151476 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/151476
Location source authentication May 6, 2008 Abandoned
Array ( [id] => 4641972 [patent_doc_number] => 08020007 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2011-09-13 [patent_title] => 'System and method for obtaining identities' [patent_app_type] => utility [patent_app_number] => 12/151630 [patent_app_country] => US [patent_app_date] => 2008-05-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4875 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 302 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/020/08020007.pdf [firstpage_image] =>[orig_patent_app_number] => 12151630 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/151630
System and method for obtaining identities May 6, 2008 Issued
Array ( [id] => 4777750 [patent_doc_number] => 20080285748 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-11-20 [patent_title] => 'Method for generating secret key in computer device and obtaining the encrypting and decrypting key' [patent_app_type] => utility [patent_app_number] => 12/149190 [patent_app_country] => US [patent_app_date] => 2008-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 1997 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0285/20080285748.pdf [firstpage_image] =>[orig_patent_app_number] => 12149190 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/149190
Method for generating secret key in computer device and obtaining the encrypting and decrypting key Apr 28, 2008 Abandoned
Array ( [id] => 5298474 [patent_doc_number] => 20090013400 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-08 [patent_title] => 'Method of filtering undesirable streams coming from a terminal presumed to be malicious' [patent_app_type] => utility [patent_app_number] => 12/150433 [patent_app_country] => US [patent_app_date] => 2008-04-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4885 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0013/20090013400.pdf [firstpage_image] =>[orig_patent_app_number] => 12150433 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/150433
Method of filtering undesirable streams coming from a terminal presumed to be malicious Apr 27, 2008 Abandoned
Array ( [id] => 8085405 [patent_doc_number] => 08150033 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-04-03 [patent_title] => 'Optical security system using fourier plane encoding' [patent_app_type] => utility [patent_app_number] => 11/867570 [patent_app_country] => US [patent_app_date] => 2007-10-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 23 [patent_figures_cnt] => 40 [patent_no_of_words] => 7658 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 211 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/150/08150033.pdf [firstpage_image] =>[orig_patent_app_number] => 11867570 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/867570
Optical security system using fourier plane encoding Oct 3, 2007 Issued
Array ( [id] => 4854817 [patent_doc_number] => 20080320561 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-12-25 [patent_title] => 'Method and System for Collaboration Involving Enterprise Nodes' [patent_app_type] => utility [patent_app_number] => 11/867456 [patent_app_country] => US [patent_app_date] => 2007-10-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8283 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0320/20080320561.pdf [firstpage_image] =>[orig_patent_app_number] => 11867456 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/867456
Method and system for collaboration involving enterprise nodes Oct 3, 2007 Issued
Array ( [id] => 8763519 [patent_doc_number] => 08424058 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-04-16 [patent_title] => 'Security proxying for end-user applications' [patent_app_type] => utility [patent_app_number] => 11/867650 [patent_app_country] => US [patent_app_date] => 2007-10-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5470 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 225 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11867650 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/867650
Security proxying for end-user applications Oct 3, 2007 Issued
Array ( [id] => 10859614 [patent_doc_number] => 08885823 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-11-11 [patent_title] => 'Method and apparatus for delivering encrypted on-demand content without use of an application defined protocol' [patent_app_type] => utility [patent_app_number] => 11/859862 [patent_app_country] => US [patent_app_date] => 2007-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 5642 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 350 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11859862 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/859862
Method and apparatus for delivering encrypted on-demand content without use of an application defined protocol Sep 23, 2007 Issued
Array ( [id] => 8109375 [patent_doc_number] => 08156342 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-04-10 [patent_title] => 'Progress indicators to encourage more secure behaviors' [patent_app_type] => utility [patent_app_number] => 11/859664 [patent_app_country] => US [patent_app_date] => 2007-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 6 [patent_no_of_words] => 3804 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 193 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/156/08156342.pdf [firstpage_image] =>[orig_patent_app_number] => 11859664 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/859664
Progress indicators to encourage more secure behaviors Sep 20, 2007 Issued
Array ( [id] => 5510628 [patent_doc_number] => 20090083835 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-03-26 [patent_title] => 'NETWORK ACCESS CONTROL' [patent_app_type] => utility [patent_app_number] => 11/859336 [patent_app_country] => US [patent_app_date] => 2007-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8748 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0083/20090083835.pdf [firstpage_image] =>[orig_patent_app_number] => 11859336 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/859336
Network access control Sep 20, 2007 Issued
Array ( [id] => 8623412 [patent_doc_number] => 08356333 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-01-15 [patent_title] => 'System and method for verifying networked sites' [patent_app_type] => utility [patent_app_number] => 11/850805 [patent_app_country] => US [patent_app_date] => 2007-09-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8127 [patent_no_of_claims] => 42 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 181 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11850805 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/850805
System and method for verifying networked sites Sep 5, 2007 Issued
Array ( [id] => 4440077 [patent_doc_number] => 07899185 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-03-01 [patent_title] => 'Real privacy management authentication system' [patent_app_type] => utility [patent_app_number] => 11/850948 [patent_app_country] => US [patent_app_date] => 2007-09-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 9293 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/899/07899185.pdf [firstpage_image] =>[orig_patent_app_number] => 11850948 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/850948
Real privacy management authentication system Sep 5, 2007 Issued
Array ( [id] => 10550775 [patent_doc_number] => 09275401 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-03-01 [patent_title] => 'Tamper resistant video rendering' [patent_app_type] => utility [patent_app_number] => 11/851045 [patent_app_country] => US [patent_app_date] => 2007-09-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5347 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 112 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11851045 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/851045
Tamper resistant video rendering Sep 5, 2007 Issued
Array ( [id] => 5326289 [patent_doc_number] => 20090064279 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-03-05 [patent_title] => 'System for secure remote access and control of computers' [patent_app_type] => utility [patent_app_number] => 11/850604 [patent_app_country] => US [patent_app_date] => 2007-09-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3188 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 11 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0064/20090064279.pdf [firstpage_image] =>[orig_patent_app_number] => 11850604 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/850604
System for secure remote access and control of computers Sep 4, 2007 Abandoned
Array ( [id] => 4882300 [patent_doc_number] => 20080155683 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-06-26 [patent_title] => 'APPARATUS AND METHOD FOR MANAGING RIGHTS OBJECT' [patent_app_type] => utility [patent_app_number] => 11/832772 [patent_app_country] => US [patent_app_date] => 2007-08-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5034 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0155/20080155683.pdf [firstpage_image] =>[orig_patent_app_number] => 11832772 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/832772
Apparatus and method for managing rights object Aug 1, 2007 Issued
Array ( [id] => 5363191 [patent_doc_number] => 20090037985 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-02-05 [patent_title] => 'Automated Peer Authentication' [patent_app_type] => utility [patent_app_number] => 11/832574 [patent_app_country] => US [patent_app_date] => 2007-08-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4688 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0037/20090037985.pdf [firstpage_image] =>[orig_patent_app_number] => 11832574 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/832574
Automated peer authentication Jul 31, 2007 Issued
Array ( [id] => 5362941 [patent_doc_number] => 20090037735 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-02-05 [patent_title] => 'METHOD AND SYSTEM FOR DELIVERING SECURE MESSAGES TO A COMPUTER DESKTOP' [patent_app_type] => utility [patent_app_number] => 11/832543 [patent_app_country] => US [patent_app_date] => 2007-08-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 26 [patent_figures_cnt] => 26 [patent_no_of_words] => 5526 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0037/20090037735.pdf [firstpage_image] =>[orig_patent_app_number] => 11832543 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/832543
METHOD AND SYSTEM FOR DELIVERING SECURE MESSAGES TO A COMPUTER DESKTOP Jul 31, 2007 Abandoned
Array ( [id] => 5489566 [patent_doc_number] => 20090290637 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-11-26 [patent_title] => 'Methods and Apparatus for Adaptive Reference Filtering' [patent_app_type] => utility [patent_app_number] => 12/309058 [patent_app_country] => US [patent_app_date] => 2007-07-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6400 [patent_no_of_claims] => 44 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0290/20090290637.pdf [firstpage_image] =>[orig_patent_app_number] => 12309058 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/309058
Methods and apparatus for adaptive reference filtering Jul 4, 2007 Issued
Menu