Search

Sayed Aresh Beheshti Shirazi

Examiner (ID: 11907, Phone: (571)270-3396 , Office: P/2435 )

Most Active Art Unit
2435
Art Unit(s)
2435, IPBS, CD
Total Applications
451
Issued Applications
351
Pending Applications
3
Abandoned Applications
96

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10496574 [patent_doc_number] => 20150381597 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-12-31 [patent_title] => 'ENTERPRISE MANAGEMENT FOR SECURE NETWORK COMMUNICATIONS OVER IPSEC' [patent_app_type] => utility [patent_app_number] => 14/688348 [patent_app_country] => US [patent_app_date] => 2015-04-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 11661 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14688348 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/688348
ENTERPRISE MANAGEMENT FOR SECURE NETWORK COMMUNICATIONS OVER IPSEC Apr 15, 2015 Abandoned
Array ( [id] => 11484436 [patent_doc_number] => 09591008 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-03-07 [patent_title] => 'Data access verification for enterprise resources' [patent_app_type] => utility [patent_app_number] => 14/688914 [patent_app_country] => US [patent_app_date] => 2015-04-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 23 [patent_figures_cnt] => 23 [patent_no_of_words] => 20683 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 592 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14688914 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/688914
Data access verification for enterprise resources Apr 15, 2015 Issued
Array ( [id] => 10427033 [patent_doc_number] => 20150312044 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-29 [patent_title] => 'COMMUNICATION APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM' [patent_app_type] => utility [patent_app_number] => 14/688147 [patent_app_country] => US [patent_app_date] => 2015-04-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 7724 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14688147 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/688147
Communication apparatus, method of controlling the same, and storage medium Apr 15, 2015 Issued
Array ( [id] => 10419100 [patent_doc_number] => 20150304111 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-10-22 [patent_title] => 'CERTIFIED IDENTIFICATION SYSTEM AND METHOD' [patent_app_type] => utility [patent_app_number] => 14/688943 [patent_app_country] => US [patent_app_date] => 2015-04-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 10134 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14688943 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/688943
Certified identification system and method Apr 15, 2015 Issued
Array ( [id] => 10335921 [patent_doc_number] => 20150220926 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-08-06 [patent_title] => 'ADAPTIVE SECONDARY AUTHENTICATION CRITERIA BASED ON ACCOUNT DATA' [patent_app_type] => utility [patent_app_number] => 14/685429 [patent_app_country] => US [patent_app_date] => 2015-04-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 10075 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14685429 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/685429
Adaptive secondary authentication criteria based on account data Apr 12, 2015 Issued
Array ( [id] => 10133149 [patent_doc_number] => 09167001 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-10-20 [patent_title] => 'Scalable network security with fast response protocol' [patent_app_type] => utility [patent_app_number] => 14/683986 [patent_app_country] => US [patent_app_date] => 2015-04-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 32 [patent_no_of_words] => 23011 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 356 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14683986 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/683986
Scalable network security with fast response protocol Apr 9, 2015 Issued
Array ( [id] => 10550773 [patent_doc_number] => 09275399 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-03-01 [patent_title] => 'Privacy management across multiple devices' [patent_app_type] => utility [patent_app_number] => 14/641768 [patent_app_country] => US [patent_app_date] => 2015-03-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 18 [patent_no_of_words] => 18318 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 286 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14641768 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/641768
Privacy management across multiple devices Mar 8, 2015 Abandoned
Array ( [id] => 10173120 [patent_doc_number] => 09203840 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-01 [patent_title] => 'System and method for remote device recognition at public hotspots' [patent_app_type] => utility [patent_app_number] => 14/638484 [patent_app_country] => US [patent_app_date] => 2015-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 24 [patent_no_of_words] => 29275 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 218 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14638484 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/638484
System and method for remote device recognition at public hotspots Mar 3, 2015 Issued
Array ( [id] => 10369456 [patent_doc_number] => 20150254461 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-10 [patent_title] => 'TESTING INTEGRATED INDEPENDENT LEVELS OF SECURITY COMPONENTS HOSTED ON A VIRTUALIZATION PLATFORM' [patent_app_type] => utility [patent_app_number] => 14/638365 [patent_app_country] => US [patent_app_date] => 2015-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4150 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14638365 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/638365
Testing integrated independent levels of security components hosted on a virtualization platform Mar 3, 2015 Issued
Array ( [id] => 10284880 [patent_doc_number] => 20150169878 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-06-18 [patent_title] => 'AUTOMATED SECURITY ASSESSMENT OF BUSINESS-CRITICAL SYSTEMS AND APPLICATIONS' [patent_app_type] => utility [patent_app_number] => 14/631147 [patent_app_country] => US [patent_app_date] => 2015-02-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 10309 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14631147 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/631147
AUTOMATED SECURITY ASSESSMENT OF BUSINESS-CRITICAL SYSTEMS AND APPLICATIONS Feb 24, 2015 Abandoned
Array ( [id] => 10578487 [patent_doc_number] => 09301147 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-03-29 [patent_title] => 'Method, apparatus, and system for data protection on interface in communications system' [patent_app_type] => utility [patent_app_number] => 14/625789 [patent_app_country] => US [patent_app_date] => 2015-02-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 14 [patent_no_of_words] => 8587 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 257 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14625789 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/625789
Method, apparatus, and system for data protection on interface in communications system Feb 18, 2015 Issued
Array ( [id] => 10359730 [patent_doc_number] => 20150244735 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-08-27 [patent_title] => 'SYSTEMS AND METHODS FOR ORCHESTRATING RUNTIME OPERATIONAL INTEGRITY' [patent_app_type] => utility [patent_app_number] => 14/623333 [patent_app_country] => US [patent_app_date] => 2015-02-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 30 [patent_figures_cnt] => 30 [patent_no_of_words] => 21714 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14623333 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/623333
SYSTEMS AND METHODS FOR ORCHESTRATING RUNTIME OPERATIONAL INTEGRITY Feb 15, 2015 Abandoned
Array ( [id] => 10293493 [patent_doc_number] => 20150178492 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-06-25 [patent_title] => 'SECURE INFORMATION FLOW' [patent_app_type] => utility [patent_app_number] => 14/617691 [patent_app_country] => US [patent_app_date] => 2015-02-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7981 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14617691 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/617691
Secure information flow Feb 8, 2015 Issued
Array ( [id] => 10337651 [patent_doc_number] => 20150222656 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-08-06 [patent_title] => 'Techniques for sharing network security event information' [patent_app_type] => utility [patent_app_number] => 14/615228 [patent_app_country] => US [patent_app_date] => 2015-02-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 25806 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14615228 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/615228
Techniques for sharing network security event information Feb 4, 2015 Issued
Array ( [id] => 10322809 [patent_doc_number] => 20150207813 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-07-23 [patent_title] => 'Techniques for sharing network security event information' [patent_app_type] => utility [patent_app_number] => 14/615202 [patent_app_country] => US [patent_app_date] => 2015-02-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 22721 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14615202 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/615202
Techniques for sharing network security event information Feb 4, 2015 Issued
Array ( [id] => 11029892 [patent_doc_number] => 20160226848 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-04 [patent_title] => 'AUTHENTICATION SURVIVABILITY FOR ASSIGNING ROLE AND VLAN BASED ON CACHED RADIUS ATTRIBUTES' [patent_app_type] => utility [patent_app_number] => 14/610033 [patent_app_country] => US [patent_app_date] => 2015-01-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6561 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14610033 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/610033
Authentication survivability for assigning role and VLAN based on cached radius attributes Jan 29, 2015 Issued
Array ( [id] => 10258481 [patent_doc_number] => 20150143478 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-05-21 [patent_title] => 'WIRELESS SERVER ACCESS CONTROL SYSTEM AND METHOD' [patent_app_type] => utility [patent_app_number] => 14/606963 [patent_app_country] => US [patent_app_date] => 2015-01-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 9863 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14606963 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/606963
Wireless server access control system and method Jan 26, 2015 Issued
Array ( [id] => 11008172 [patent_doc_number] => 20160205124 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-07-14 [patent_title] => 'SYSTEM AND METHOD FOR DETECTING MOBILE CYBER INCIDENT' [patent_app_type] => utility [patent_app_number] => 14/602602 [patent_app_country] => US [patent_app_date] => 2015-01-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4365 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602602 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/602602
SYSTEM AND METHOD FOR DETECTING MOBILE CYBER INCIDENT Jan 21, 2015
Array ( [id] => 11540433 [patent_doc_number] => 09614863 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-04-04 [patent_title] => 'System and method for analyzing mobile cyber incident' [patent_app_type] => utility [patent_app_number] => 14/602633 [patent_app_country] => US [patent_app_date] => 2015-01-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 8400 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 512 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602633 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/602633
System and method for analyzing mobile cyber incident Jan 21, 2015 Issued
Array ( [id] => 11013294 [patent_doc_number] => 20160210247 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-07-21 [patent_title] => 'ACCESS KEY GENERATION FOR COMPUTER-READABLE MEMORY' [patent_app_type] => utility [patent_app_number] => 14/598430 [patent_app_country] => US [patent_app_date] => 2015-01-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7227 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14598430 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/598430
Access key generation for computer-readable memory Jan 15, 2015 Issued
Menu