
Ali S. Abyaneh
Examiner (ID: 3577)
| Most Active Art Unit | 2437 |
| Art Unit(s) | 2437, 2137 |
| Total Applications | 883 |
| Issued Applications | 647 |
| Pending Applications | 66 |
| Abandoned Applications | 183 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18416882
[patent_doc_number] => 11671433
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-06-06
[patent_title] => Data loss prevention incident forwarding
[patent_app_type] => utility
[patent_app_number] => 16/853862
[patent_app_country] => US
[patent_app_date] => 2020-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 9963
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16853862
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/853862 | Data loss prevention incident forwarding | Apr 20, 2020 | Issued |
Array
(
[id] => 17223746
[patent_doc_number] => 11176247
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-16
[patent_title] => System and method for container assessment using sandboxing
[patent_app_type] => utility
[patent_app_number] => 16/838903
[patent_app_country] => US
[patent_app_date] => 2020-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4720
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16838903
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/838903 | System and method for container assessment using sandboxing | Apr 1, 2020 | Issued |
Array
(
[id] => 16623756
[patent_doc_number] => 20210042409
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-11
[patent_title] => CROSS-NETWORK SECURITY EVALUATION
[patent_app_type] => utility
[patent_app_number] => 16/823282
[patent_app_country] => US
[patent_app_date] => 2020-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3477
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 68
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16823282
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/823282 | Cross-network security evaluation | Mar 17, 2020 | Issued |
Array
(
[id] => 17116844
[patent_doc_number] => 20210297441
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-09-23
[patent_title] => SYSTEM AND METHOD FOR DETERMINING CYBERSECURITY RATING AND RISK SCORING
[patent_app_type] => utility
[patent_app_number] => 16/822691
[patent_app_country] => US
[patent_app_date] => 2020-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14087
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -32
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16822691
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/822691 | System and method for determining cybersecurity rating and risk scoring | Mar 17, 2020 | Issued |
Array
(
[id] => 18130428
[patent_doc_number] => 11556639
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-17
[patent_title] => Method for automatic creation of malware detection signature
[patent_app_type] => utility
[patent_app_number] => 16/816972
[patent_app_country] => US
[patent_app_date] => 2020-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5607
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 346
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16816972
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/816972 | Method for automatic creation of malware detection signature | Mar 11, 2020 | Issued |
Array
(
[id] => 17977629
[patent_doc_number] => 11494491
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-08
[patent_title] => Systems and methods for protecting against malware code injections in trusted processes by a multi-target injector
[patent_app_type] => utility
[patent_app_number] => 16/812615
[patent_app_country] => US
[patent_app_date] => 2020-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 8010
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16812615
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/812615 | Systems and methods for protecting against malware code injections in trusted processes by a multi-target injector | Mar 8, 2020 | Issued |
Array
(
[id] => 17624193
[patent_doc_number] => 11343264
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-24
[patent_title] => System and method for determining the confidence level in attributing a cyber campaign to an activity group
[patent_app_type] => utility
[patent_app_number] => 16/813605
[patent_app_country] => US
[patent_app_date] => 2020-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 3576
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 356
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16813605
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/813605 | System and method for determining the confidence level in attributing a cyber campaign to an activity group | Mar 8, 2020 | Issued |
Array
(
[id] => 18554148
[patent_doc_number] => 20230252161
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-08-10
[patent_title] => METHODS OF EVALUATING SOURCE CODE USING NUMERIC ARRAY REPRESENTATIONS OF SOURCE CODE ELEMENTS
[patent_app_type] => utility
[patent_app_number] => 17/797747
[patent_app_country] => US
[patent_app_date] => 2022-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9960
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17797747
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/797747 | Methods of evaluating source code using numeric array representations of source code elements | Feb 9, 2020 | Issued |
Array
(
[id] => 17411259
[patent_doc_number] => 11252166
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-02-15
[patent_title] => Providing data authorization based on blockchain
[patent_app_type] => utility
[patent_app_number] => 16/779488
[patent_app_country] => US
[patent_app_date] => 2020-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 12
[patent_no_of_words] => 14409
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 291
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16779488
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/779488 | Providing data authorization based on blockchain | Jan 30, 2020 | Issued |
Array
(
[id] => 17565401
[patent_doc_number] => 20220129550
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-04-28
[patent_title] => Method for constructing behavioural software signatures
[patent_app_type] => utility
[patent_app_number] => 17/430922
[patent_app_country] => US
[patent_app_date] => 2020-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6492
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17430922
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/430922 | Method for constructing behavioural software signatures | Jan 29, 2020 | Issued |
Array
(
[id] => 17047038
[patent_doc_number] => 11100220
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-24
[patent_title] => Data type recognition, model training and risk recognition methods, apparatuses and devices
[patent_app_type] => utility
[patent_app_number] => 16/774663
[patent_app_country] => US
[patent_app_date] => 2020-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6647
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16774663
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/774663 | Data type recognition, model training and risk recognition methods, apparatuses and devices | Jan 27, 2020 | Issued |
Array
(
[id] => 17729420
[patent_doc_number] => 11385807
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-07-12
[patent_title] => System and method for recovering a node in a cloud infastructure after an intrusion
[patent_app_type] => utility
[patent_app_number] => 16/731988
[patent_app_country] => US
[patent_app_date] => 2019-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6579
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16731988
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/731988 | System and method for recovering a node in a cloud infastructure after an intrusion | Dec 30, 2019 | Issued |
Array
(
[id] => 16937779
[patent_doc_number] => 20210203668
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-01
[patent_title] => SYSTEMS AND METHODS FOR MALICIOUS CLIENT DETECTION THROUGH PROPERTY ANALYSIS
[patent_app_type] => utility
[patent_app_number] => 16/731501
[patent_app_country] => US
[patent_app_date] => 2019-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7943
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16731501
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/731501 | Systems and methods for malicious client detection through property analysis | Dec 30, 2019 | Issued |
Array
(
[id] => 17972273
[patent_doc_number] => 11489829
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-11-01
[patent_title] => Automatic account protection for compromised credentials
[patent_app_type] => utility
[patent_app_number] => 16/721853
[patent_app_country] => US
[patent_app_date] => 2019-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5507
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16721853
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/721853 | Automatic account protection for compromised credentials | Dec 18, 2019 | Issued |
Array
(
[id] => 16906165
[patent_doc_number] => 20210185081
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-17
[patent_title] => SYSTEMS AND METHODS FOR MITIGATING ELECTRICAL INSTALLATION SECURITY THREATS
[patent_app_type] => utility
[patent_app_number] => 16/717670
[patent_app_country] => US
[patent_app_date] => 2019-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10523
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16717670
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/717670 | SYSTEMS AND METHODS FOR MITIGATING ELECTRICAL INSTALLATION SECURITY THREATS | Dec 16, 2019 | Abandoned |
Array
(
[id] => 16049819
[patent_doc_number] => 10686802
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-06-16
[patent_title] => Methods and systems for provisioning cloud computing services
[patent_app_type] => utility
[patent_app_number] => 16/701367
[patent_app_country] => US
[patent_app_date] => 2019-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10049
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 394
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16701367
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/701367 | Methods and systems for provisioning cloud computing services | Dec 2, 2019 | Issued |
Array
(
[id] => 17863792
[patent_doc_number] => 11444959
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-13
[patent_title] => Integrated equipment fault and cyber attack detection arrangement
[patent_app_type] => utility
[patent_app_number] => 16/682727
[patent_app_country] => US
[patent_app_date] => 2019-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4279
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16682727
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/682727 | Integrated equipment fault and cyber attack detection arrangement | Nov 12, 2019 | Issued |
Array
(
[id] => 15908641
[patent_doc_number] => 20200153842
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-14
[patent_title] => SYSTEM AND METHOD FOR PREVENTING A STEGOSPLOIT ATTACK
[patent_app_type] => utility
[patent_app_number] => 16/680498
[patent_app_country] => US
[patent_app_date] => 2019-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11146
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16680498
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/680498 | SYSTEM AND METHOD FOR PREVENTING A STEGOSPLOIT ATTACK | Nov 11, 2019 | Abandoned |
Array
(
[id] => 16828865
[patent_doc_number] => 20210144158
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-13
[patent_title] => SYSTEMS AND METHODS FOR FACILITATING DETECTION OF A SECURITY EVENT ASSOCIATED WITH AN IOT DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/679936
[patent_app_country] => US
[patent_app_date] => 2019-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11210
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16679936
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/679936 | Systems and methods for facilitating detection of a security event associated with an IoT device | Nov 10, 2019 | Issued |
Array
(
[id] => 17560151
[patent_doc_number] => 11316885
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-04-26
[patent_title] => Self-learning data collection of machine characteristics
[patent_app_type] => utility
[patent_app_number] => 16/669188
[patent_app_country] => US
[patent_app_date] => 2019-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12750
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 311
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16669188
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/669188 | Self-learning data collection of machine characteristics | Oct 29, 2019 | Issued |