
Sayed Aresh Beheshti Shirazi
Examiner (ID: 11907, Phone: (571)270-3396 , Office: P/2435 )
| Most Active Art Unit | 2435 |
| Art Unit(s) | 2435, IPBS, CD |
| Total Applications | 451 |
| Issued Applications | 351 |
| Pending Applications | 3 |
| Abandoned Applications | 96 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10496574
[patent_doc_number] => 20150381597
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-31
[patent_title] => 'ENTERPRISE MANAGEMENT FOR SECURE NETWORK COMMUNICATIONS OVER IPSEC'
[patent_app_type] => utility
[patent_app_number] => 14/688348
[patent_app_country] => US
[patent_app_date] => 2015-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 11661
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14688348
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/688348 | ENTERPRISE MANAGEMENT FOR SECURE NETWORK COMMUNICATIONS OVER IPSEC | Apr 15, 2015 | Abandoned |
Array
(
[id] => 11484436
[patent_doc_number] => 09591008
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-07
[patent_title] => 'Data access verification for enterprise resources'
[patent_app_type] => utility
[patent_app_number] => 14/688914
[patent_app_country] => US
[patent_app_date] => 2015-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 20683
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 592
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14688914
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/688914 | Data access verification for enterprise resources | Apr 15, 2015 | Issued |
Array
(
[id] => 10427033
[patent_doc_number] => 20150312044
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-29
[patent_title] => 'COMMUNICATION APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 14/688147
[patent_app_country] => US
[patent_app_date] => 2015-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 7724
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14688147
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/688147 | Communication apparatus, method of controlling the same, and storage medium | Apr 15, 2015 | Issued |
Array
(
[id] => 10419100
[patent_doc_number] => 20150304111
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-22
[patent_title] => 'CERTIFIED IDENTIFICATION SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/688943
[patent_app_country] => US
[patent_app_date] => 2015-04-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10134
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14688943
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/688943 | Certified identification system and method | Apr 15, 2015 | Issued |
Array
(
[id] => 10335921
[patent_doc_number] => 20150220926
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-06
[patent_title] => 'ADAPTIVE SECONDARY AUTHENTICATION CRITERIA BASED ON ACCOUNT DATA'
[patent_app_type] => utility
[patent_app_number] => 14/685429
[patent_app_country] => US
[patent_app_date] => 2015-04-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10075
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14685429
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/685429 | Adaptive secondary authentication criteria based on account data | Apr 12, 2015 | Issued |
Array
(
[id] => 10133149
[patent_doc_number] => 09167001
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-10-20
[patent_title] => 'Scalable network security with fast response protocol'
[patent_app_type] => utility
[patent_app_number] => 14/683986
[patent_app_country] => US
[patent_app_date] => 2015-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 32
[patent_no_of_words] => 23011
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 356
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14683986
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/683986 | Scalable network security with fast response protocol | Apr 9, 2015 | Issued |
Array
(
[id] => 10550773
[patent_doc_number] => 09275399
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-01
[patent_title] => 'Privacy management across multiple devices'
[patent_app_type] => utility
[patent_app_number] => 14/641768
[patent_app_country] => US
[patent_app_date] => 2015-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 18
[patent_no_of_words] => 18318
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 286
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14641768
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/641768 | Privacy management across multiple devices | Mar 8, 2015 | Abandoned |
Array
(
[id] => 10173120
[patent_doc_number] => 09203840
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-01
[patent_title] => 'System and method for remote device recognition at public hotspots'
[patent_app_type] => utility
[patent_app_number] => 14/638484
[patent_app_country] => US
[patent_app_date] => 2015-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 24
[patent_no_of_words] => 29275
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14638484
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/638484 | System and method for remote device recognition at public hotspots | Mar 3, 2015 | Issued |
Array
(
[id] => 10369456
[patent_doc_number] => 20150254461
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-10
[patent_title] => 'TESTING INTEGRATED INDEPENDENT LEVELS OF SECURITY COMPONENTS HOSTED ON A VIRTUALIZATION PLATFORM'
[patent_app_type] => utility
[patent_app_number] => 14/638365
[patent_app_country] => US
[patent_app_date] => 2015-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4150
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14638365
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/638365 | Testing integrated independent levels of security components hosted on a virtualization platform | Mar 3, 2015 | Issued |
Array
(
[id] => 10284880
[patent_doc_number] => 20150169878
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-18
[patent_title] => 'AUTOMATED SECURITY ASSESSMENT OF BUSINESS-CRITICAL SYSTEMS AND APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 14/631147
[patent_app_country] => US
[patent_app_date] => 2015-02-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10309
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14631147
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/631147 | AUTOMATED SECURITY ASSESSMENT OF BUSINESS-CRITICAL SYSTEMS AND APPLICATIONS | Feb 24, 2015 | Abandoned |
Array
(
[id] => 10578487
[patent_doc_number] => 09301147
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-29
[patent_title] => 'Method, apparatus, and system for data protection on interface in communications system'
[patent_app_type] => utility
[patent_app_number] => 14/625789
[patent_app_country] => US
[patent_app_date] => 2015-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 14
[patent_no_of_words] => 8587
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 257
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14625789
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/625789 | Method, apparatus, and system for data protection on interface in communications system | Feb 18, 2015 | Issued |
Array
(
[id] => 10359730
[patent_doc_number] => 20150244735
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'SYSTEMS AND METHODS FOR ORCHESTRATING RUNTIME OPERATIONAL INTEGRITY'
[patent_app_type] => utility
[patent_app_number] => 14/623333
[patent_app_country] => US
[patent_app_date] => 2015-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 30
[patent_no_of_words] => 21714
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14623333
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/623333 | SYSTEMS AND METHODS FOR ORCHESTRATING RUNTIME OPERATIONAL INTEGRITY | Feb 15, 2015 | Abandoned |
Array
(
[id] => 10293493
[patent_doc_number] => 20150178492
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-25
[patent_title] => 'SECURE INFORMATION FLOW'
[patent_app_type] => utility
[patent_app_number] => 14/617691
[patent_app_country] => US
[patent_app_date] => 2015-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7981
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14617691
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/617691 | Secure information flow | Feb 8, 2015 | Issued |
Array
(
[id] => 10337651
[patent_doc_number] => 20150222656
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-06
[patent_title] => 'Techniques for sharing network security event information'
[patent_app_type] => utility
[patent_app_number] => 14/615228
[patent_app_country] => US
[patent_app_date] => 2015-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 25806
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14615228
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/615228 | Techniques for sharing network security event information | Feb 4, 2015 | Issued |
Array
(
[id] => 10322809
[patent_doc_number] => 20150207813
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-23
[patent_title] => 'Techniques for sharing network security event information'
[patent_app_type] => utility
[patent_app_number] => 14/615202
[patent_app_country] => US
[patent_app_date] => 2015-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 22721
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14615202
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/615202 | Techniques for sharing network security event information | Feb 4, 2015 | Issued |
Array
(
[id] => 11029892
[patent_doc_number] => 20160226848
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'AUTHENTICATION SURVIVABILITY FOR ASSIGNING ROLE AND VLAN BASED ON CACHED RADIUS ATTRIBUTES'
[patent_app_type] => utility
[patent_app_number] => 14/610033
[patent_app_country] => US
[patent_app_date] => 2015-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6561
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14610033
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/610033 | Authentication survivability for assigning role and VLAN based on cached radius attributes | Jan 29, 2015 | Issued |
Array
(
[id] => 10258481
[patent_doc_number] => 20150143478
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-21
[patent_title] => 'WIRELESS SERVER ACCESS CONTROL SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/606963
[patent_app_country] => US
[patent_app_date] => 2015-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9863
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14606963
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/606963 | Wireless server access control system and method | Jan 26, 2015 | Issued |
Array
(
[id] => 11008172
[patent_doc_number] => 20160205124
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-14
[patent_title] => 'SYSTEM AND METHOD FOR DETECTING MOBILE CYBER INCIDENT'
[patent_app_type] => utility
[patent_app_number] => 14/602602
[patent_app_country] => US
[patent_app_date] => 2015-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4365
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602602
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/602602 | SYSTEM AND METHOD FOR DETECTING MOBILE CYBER INCIDENT | Jan 21, 2015 | |
Array
(
[id] => 11540433
[patent_doc_number] => 09614863
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-04
[patent_title] => 'System and method for analyzing mobile cyber incident'
[patent_app_type] => utility
[patent_app_number] => 14/602633
[patent_app_country] => US
[patent_app_date] => 2015-01-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8400
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 512
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14602633
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/602633 | System and method for analyzing mobile cyber incident | Jan 21, 2015 | Issued |
Array
(
[id] => 11013294
[patent_doc_number] => 20160210247
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-21
[patent_title] => 'ACCESS KEY GENERATION FOR COMPUTER-READABLE MEMORY'
[patent_app_type] => utility
[patent_app_number] => 14/598430
[patent_app_country] => US
[patent_app_date] => 2015-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7227
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14598430
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/598430 | Access key generation for computer-readable memory | Jan 15, 2015 | Issued |