Search

Sayed Aresh Beheshti Shirazi

Examiner (ID: 11907, Phone: (571)270-3396 , Office: P/2435 )

Most Active Art Unit
2435
Art Unit(s)
2435, IPBS, CD
Total Applications
451
Issued Applications
351
Pending Applications
3
Abandoned Applications
96

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10818726 [patent_doc_number] => 20160164890 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-06-09 [patent_title] => 'Techniques for sharing network security event information' [patent_app_type] => utility [patent_app_number] => 14/819443 [patent_app_country] => US [patent_app_date] => 2015-08-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 25807 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14819443 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/819443
Techniques for sharing network security event information Aug 5, 2015 Issued
Array ( [id] => 10409107 [patent_doc_number] => 20150294115 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-15 [patent_title] => 'SYSTEMS AND METHODS FOR SECURING VIRTUAL MACHINE COMPUTING ENVIRONMENTS' [patent_app_type] => utility [patent_app_number] => 14/749058 [patent_app_country] => US [patent_app_date] => 2015-06-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 56 [patent_figures_cnt] => 56 [patent_no_of_words] => 53330 [patent_no_of_claims] => 31 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14749058 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/749058
Systems and methods for securing virtual machine computing environments Jun 23, 2015 Issued
Array ( [id] => 11600858 [patent_doc_number] => 09648044 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-05-09 [patent_title] => 'Securing communication over a network using client system authorization and dynamically assigned proxy servers' [patent_app_type] => utility [patent_app_number] => 14/748167 [patent_app_country] => US [patent_app_date] => 2015-06-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 12890 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 269 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14748167 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/748167
Securing communication over a network using client system authorization and dynamically assigned proxy servers Jun 22, 2015 Issued
Array ( [id] => 11354712 [patent_doc_number] => 20160373454 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-22 [patent_title] => 'SYSTEMS AND METHODS FOR PROVIDING CONTENT TO VERIFIED ENTITIES' [patent_app_type] => utility [patent_app_number] => 14/743946 [patent_app_country] => US [patent_app_date] => 2015-06-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 14236 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14743946 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/743946
Systems and methods for providing content to verified entities Jun 17, 2015 Issued
Array ( [id] => 11354704 [patent_doc_number] => 20160373446 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-22 [patent_title] => 'SYSTEMS AND METHODS FOR PROVIDING CONTENT TO VERIFIED ENTITIES' [patent_app_type] => utility [patent_app_number] => 14/743943 [patent_app_country] => US [patent_app_date] => 2015-06-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 14236 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14743943 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/743943
Systems and methods for providing content to verified entities Jun 17, 2015 Issued
Array ( [id] => 10788489 [patent_doc_number] => 20160134645 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-05-12 [patent_title] => 'IDENTIFYING AN IMPOSTER ACCOUNT IN A SOCIAL NETWORK' [patent_app_type] => utility [patent_app_number] => 14/708502 [patent_app_country] => US [patent_app_date] => 2015-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 10246 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14708502 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/708502
Identifying an imposter account in a social network May 10, 2015 Issued
Array ( [id] => 10441538 [patent_doc_number] => 20150326550 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-11-12 [patent_title] => 'AUTHENTICATION WITH PARENTAL CONTROL FUNCTIONALITY' [patent_app_type] => utility [patent_app_number] => 14/705554 [patent_app_country] => US [patent_app_date] => 2015-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 41 [patent_figures_cnt] => 41 [patent_no_of_words] => 11175 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705554 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/705554
Authentication with parental control functionality May 5, 2015 Issued
Array ( [id] => 10439551 [patent_doc_number] => 20150324563 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-11-12 [patent_title] => 'Behavioral Authentication System using a Behavior Server for Authentication of Multiple Users based on their Behavior' [patent_app_type] => utility [patent_app_number] => 14/705478 [patent_app_country] => US [patent_app_date] => 2015-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9299 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705478 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/705478
Behavioral authentication system using a behavior server for authentication of multiple users based on their behavior May 5, 2015 Issued
Array ( [id] => 13284819 [patent_doc_number] => 10154007 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-12-11 [patent_title] => Enterprise cloud access control and network access control policy using risk based blocking [patent_app_type] => utility [patent_app_number] => 14/705824 [patent_app_country] => US [patent_app_date] => 2015-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5656 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 309 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705824 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/705824
Enterprise cloud access control and network access control policy using risk based blocking May 5, 2015 Issued
Array ( [id] => 11347288 [patent_doc_number] => 09531710 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-12-27 [patent_title] => 'Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication' [patent_app_type] => utility [patent_app_number] => 14/705321 [patent_app_country] => US [patent_app_date] => 2015-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 8879 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 496 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705321 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/705321
Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication May 5, 2015 Issued
Array ( [id] => 13864273 [patent_doc_number] => 10193879 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-01-29 [patent_title] => Method and system for software application deployment [patent_app_type] => utility [patent_app_number] => 14/705847 [patent_app_country] => US [patent_app_date] => 2015-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 9026 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 210 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705847 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/705847
Method and system for software application deployment May 5, 2015 Issued
Array ( [id] => 12316965 [patent_doc_number] => 09942046 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-04-10 [patent_title] => Digital currency mining circuitry with adaptable difficulty compare capabilities [patent_app_type] => utility [patent_app_number] => 14/705905 [patent_app_country] => US [patent_app_date] => 2015-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 20 [patent_no_of_words] => 11979 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 97 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705905 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/705905
Digital currency mining circuitry with adaptable difficulty compare capabilities May 5, 2015 Issued
Array ( [id] => 10985285 [patent_doc_number] => 20160182230 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-06-23 [patent_title] => 'SECURE TOKEN-BASED SIGNATURE SCHEMES USING LOOK-UP TABLES' [patent_app_type] => utility [patent_app_number] => 14/705316 [patent_app_country] => US [patent_app_date] => 2015-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8088 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705316 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/705316
Secure token-based signature schemes using look-up tables May 5, 2015 Issued
Array ( [id] => 10439594 [patent_doc_number] => 20150324606 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-11-12 [patent_title] => 'Identifying and Securing Sensitive Data at its Source' [patent_app_type] => utility [patent_app_number] => 14/705718 [patent_app_country] => US [patent_app_date] => 2015-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 39 [patent_figures_cnt] => 39 [patent_no_of_words] => 12128 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705718 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/705718
Identifying and securing sensitive data at its source May 5, 2015 Issued
Array ( [id] => 14368715 [patent_doc_number] => 10305679 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-05-28 [patent_title] => Method for implementing a communication between control units [patent_app_type] => utility [patent_app_number] => 14/705404 [patent_app_country] => US [patent_app_date] => 2015-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 5 [patent_no_of_words] => 2511 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 263 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705404 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/705404
Method for implementing a communication between control units May 5, 2015 Issued
Array ( [id] => 10352030 [patent_doc_number] => 20150237035 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-08-20 [patent_title] => 'Securing Organizational Computing Assets over a Network Using Virtual Domains' [patent_app_type] => utility [patent_app_number] => 14/704852 [patent_app_country] => US [patent_app_date] => 2015-05-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 12740 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14704852 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/704852
Securing organizational computing assets over a network using virtual domains May 4, 2015 Issued
Array ( [id] => 10351993 [patent_doc_number] => 20150236998 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-08-20 [patent_title] => 'COMPUTER IMPLEMENTED METHODS AND APPARATUS FOR INTEGRATING A SOCIAL NETWORK INFORMATION FEED WITH A NETWORK COMMUNICATIONS APPLICATION' [patent_app_type] => utility [patent_app_number] => 14/702340 [patent_app_country] => US [patent_app_date] => 2015-05-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 24 [patent_figures_cnt] => 24 [patent_no_of_words] => 43133 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702340 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/702340
Computer implemented methods and apparatus for integrating a social network information feed with a network communications application Apr 30, 2015 Issued
Array ( [id] => 10410925 [patent_doc_number] => 20150295934 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-15 [patent_title] => 'PROVIDING ACCESS CONTROL FOR PUBLIC AND PRIVATE DOCUMENT FIELDS' [patent_app_type] => utility [patent_app_number] => 14/701910 [patent_app_country] => US [patent_app_date] => 2015-05-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8914 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14701910 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/701910
Providing access control for public and private document fields Apr 30, 2015 Issued
Array ( [id] => 10434150 [patent_doc_number] => 20150319162 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-11-05 [patent_title] => 'ELECTRONIC ARRANGEMENT AND METHOD FOR ENTITY-SPECIFIC TOKEN SET MANAGEMENT AND RELATED MECHANISM FOR OFFERING PERSONALIZED DIGITAL CONTENT BASED ON INTERACTIONS BETWEEN ENTITIES' [patent_app_type] => utility [patent_app_number] => 14/700198 [patent_app_country] => US [patent_app_date] => 2015-04-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 10247 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14700198 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/700198
ELECTRONIC ARRANGEMENT AND METHOD FOR ENTITY-SPECIFIC TOKEN SET MANAGEMENT AND RELATED MECHANISM FOR OFFERING PERSONALIZED DIGITAL CONTENT BASED ON INTERACTIONS BETWEEN ENTITIES Apr 29, 2015 Abandoned
Array ( [id] => 10562805 [patent_doc_number] => 09286483 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-03-15 [patent_title] => 'Protecting visible data during computerized process usage' [patent_app_type] => utility [patent_app_number] => 14/690882 [patent_app_country] => US [patent_app_date] => 2015-04-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6560 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 162 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14690882 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/690882
Protecting visible data during computerized process usage Apr 19, 2015 Issued
Menu