
Sayed Aresh Beheshti Shirazi
Examiner (ID: 11907, Phone: (571)270-3396 , Office: P/2435 )
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435, IPBS, CD |
| Total Applications | 451 |
| Issued Applications | 351 |
| Pending Applications | 3 |
| Abandoned Applications | 96 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10818726
[patent_doc_number] => 20160164890
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-09
[patent_title] => 'Techniques for sharing network security event information'
[patent_app_type] => utility
[patent_app_number] => 14/819443
[patent_app_country] => US
[patent_app_date] => 2015-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 25807
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14819443
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/819443 | Techniques for sharing network security event information | Aug 5, 2015 | Issued |
Array
(
[id] => 10409107
[patent_doc_number] => 20150294115
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-15
[patent_title] => 'SYSTEMS AND METHODS FOR SECURING VIRTUAL MACHINE COMPUTING ENVIRONMENTS'
[patent_app_type] => utility
[patent_app_number] => 14/749058
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 56
[patent_figures_cnt] => 56
[patent_no_of_words] => 53330
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14749058
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/749058 | Systems and methods for securing virtual machine computing environments | Jun 23, 2015 | Issued |
Array
(
[id] => 11600858
[patent_doc_number] => 09648044
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-09
[patent_title] => 'Securing communication over a network using client system authorization and dynamically assigned proxy servers'
[patent_app_type] => utility
[patent_app_number] => 14/748167
[patent_app_country] => US
[patent_app_date] => 2015-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 12890
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14748167
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/748167 | Securing communication over a network using client system authorization and dynamically assigned proxy servers | Jun 22, 2015 | Issued |
Array
(
[id] => 11354712
[patent_doc_number] => 20160373454
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'SYSTEMS AND METHODS FOR PROVIDING CONTENT TO VERIFIED ENTITIES'
[patent_app_type] => utility
[patent_app_number] => 14/743946
[patent_app_country] => US
[patent_app_date] => 2015-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 14236
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14743946
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/743946 | Systems and methods for providing content to verified entities | Jun 17, 2015 | Issued |
Array
(
[id] => 11354704
[patent_doc_number] => 20160373446
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'SYSTEMS AND METHODS FOR PROVIDING CONTENT TO VERIFIED ENTITIES'
[patent_app_type] => utility
[patent_app_number] => 14/743943
[patent_app_country] => US
[patent_app_date] => 2015-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 14236
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14743943
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/743943 | Systems and methods for providing content to verified entities | Jun 17, 2015 | Issued |
Array
(
[id] => 10788489
[patent_doc_number] => 20160134645
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-12
[patent_title] => 'IDENTIFYING AN IMPOSTER ACCOUNT IN A SOCIAL NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/708502
[patent_app_country] => US
[patent_app_date] => 2015-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10246
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14708502
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/708502 | Identifying an imposter account in a social network | May 10, 2015 | Issued |
Array
(
[id] => 10441538
[patent_doc_number] => 20150326550
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'AUTHENTICATION WITH PARENTAL CONTROL FUNCTIONALITY'
[patent_app_type] => utility
[patent_app_number] => 14/705554
[patent_app_country] => US
[patent_app_date] => 2015-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 41
[patent_figures_cnt] => 41
[patent_no_of_words] => 11175
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705554
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/705554 | Authentication with parental control functionality | May 5, 2015 | Issued |
Array
(
[id] => 10439551
[patent_doc_number] => 20150324563
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'Behavioral Authentication System using a Behavior Server for Authentication of Multiple Users based on their Behavior'
[patent_app_type] => utility
[patent_app_number] => 14/705478
[patent_app_country] => US
[patent_app_date] => 2015-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9299
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705478
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/705478 | Behavioral authentication system using a behavior server for authentication of multiple users based on their behavior | May 5, 2015 | Issued |
Array
(
[id] => 13284819
[patent_doc_number] => 10154007
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-12-11
[patent_title] => Enterprise cloud access control and network access control policy using risk based blocking
[patent_app_type] => utility
[patent_app_number] => 14/705824
[patent_app_country] => US
[patent_app_date] => 2015-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5656
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 309
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705824
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/705824 | Enterprise cloud access control and network access control policy using risk based blocking | May 5, 2015 | Issued |
Array
(
[id] => 11347288
[patent_doc_number] => 09531710
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-12-27
[patent_title] => 'Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication'
[patent_app_type] => utility
[patent_app_number] => 14/705321
[patent_app_country] => US
[patent_app_date] => 2015-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8879
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 496
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705321
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/705321 | Behavioral authentication system using a biometric fingerprint sensor and user behavior for authentication | May 5, 2015 | Issued |
Array
(
[id] => 13864273
[patent_doc_number] => 10193879
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-01-29
[patent_title] => Method and system for software application deployment
[patent_app_type] => utility
[patent_app_number] => 14/705847
[patent_app_country] => US
[patent_app_date] => 2015-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9026
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705847
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/705847 | Method and system for software application deployment | May 5, 2015 | Issued |
Array
(
[id] => 12316965
[patent_doc_number] => 09942046
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-10
[patent_title] => Digital currency mining circuitry with adaptable difficulty compare capabilities
[patent_app_type] => utility
[patent_app_number] => 14/705905
[patent_app_country] => US
[patent_app_date] => 2015-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 20
[patent_no_of_words] => 11979
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705905
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/705905 | Digital currency mining circuitry with adaptable difficulty compare capabilities | May 5, 2015 | Issued |
Array
(
[id] => 10985285
[patent_doc_number] => 20160182230
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-23
[patent_title] => 'SECURE TOKEN-BASED SIGNATURE SCHEMES USING LOOK-UP TABLES'
[patent_app_type] => utility
[patent_app_number] => 14/705316
[patent_app_country] => US
[patent_app_date] => 2015-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8088
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705316
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/705316 | Secure token-based signature schemes using look-up tables | May 5, 2015 | Issued |
Array
(
[id] => 10439594
[patent_doc_number] => 20150324606
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'Identifying and Securing Sensitive Data at its Source'
[patent_app_type] => utility
[patent_app_number] => 14/705718
[patent_app_country] => US
[patent_app_date] => 2015-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 39
[patent_figures_cnt] => 39
[patent_no_of_words] => 12128
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705718
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/705718 | Identifying and securing sensitive data at its source | May 5, 2015 | Issued |
Array
(
[id] => 14368715
[patent_doc_number] => 10305679
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-28
[patent_title] => Method for implementing a communication between control units
[patent_app_type] => utility
[patent_app_number] => 14/705404
[patent_app_country] => US
[patent_app_date] => 2015-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 2511
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 263
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14705404
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/705404 | Method for implementing a communication between control units | May 5, 2015 | Issued |
Array
(
[id] => 10352030
[patent_doc_number] => 20150237035
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-20
[patent_title] => 'Securing Organizational Computing Assets over a Network Using Virtual Domains'
[patent_app_type] => utility
[patent_app_number] => 14/704852
[patent_app_country] => US
[patent_app_date] => 2015-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 12740
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14704852
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/704852 | Securing organizational computing assets over a network using virtual domains | May 4, 2015 | Issued |
Array
(
[id] => 10351993
[patent_doc_number] => 20150236998
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-20
[patent_title] => 'COMPUTER IMPLEMENTED METHODS AND APPARATUS FOR INTEGRATING A SOCIAL NETWORK INFORMATION FEED WITH A NETWORK COMMUNICATIONS APPLICATION'
[patent_app_type] => utility
[patent_app_number] => 14/702340
[patent_app_country] => US
[patent_app_date] => 2015-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 43133
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14702340
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/702340 | Computer implemented methods and apparatus for integrating a social network information feed with a network communications application | Apr 30, 2015 | Issued |
Array
(
[id] => 10410925
[patent_doc_number] => 20150295934
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-15
[patent_title] => 'PROVIDING ACCESS CONTROL FOR PUBLIC AND PRIVATE DOCUMENT FIELDS'
[patent_app_type] => utility
[patent_app_number] => 14/701910
[patent_app_country] => US
[patent_app_date] => 2015-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8914
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14701910
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/701910 | Providing access control for public and private document fields | Apr 30, 2015 | Issued |
Array
(
[id] => 10434150
[patent_doc_number] => 20150319162
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-05
[patent_title] => 'ELECTRONIC ARRANGEMENT AND METHOD FOR ENTITY-SPECIFIC TOKEN SET MANAGEMENT AND RELATED MECHANISM FOR OFFERING PERSONALIZED DIGITAL CONTENT BASED ON INTERACTIONS BETWEEN ENTITIES'
[patent_app_type] => utility
[patent_app_number] => 14/700198
[patent_app_country] => US
[patent_app_date] => 2015-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10247
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14700198
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/700198 | ELECTRONIC ARRANGEMENT AND METHOD FOR ENTITY-SPECIFIC TOKEN SET MANAGEMENT AND RELATED MECHANISM FOR OFFERING PERSONALIZED DIGITAL CONTENT BASED ON INTERACTIONS BETWEEN ENTITIES | Apr 29, 2015 | Abandoned |
Array
(
[id] => 10562805
[patent_doc_number] => 09286483
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-15
[patent_title] => 'Protecting visible data during computerized process usage'
[patent_app_type] => utility
[patent_app_number] => 14/690882
[patent_app_country] => US
[patent_app_date] => 2015-04-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6560
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14690882
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/690882 | Protecting visible data during computerized process usage | Apr 19, 2015 | Issued |