
Ali S. Abyaneh
Examiner (ID: 10306, Phone: (571)272-7961 , Office: P/2437 )
| Most Active Art Unit | 2437 |
| Art Unit(s) | 2137, 2437 |
| Total Applications | 866 |
| Issued Applications | 638 |
| Pending Applications | 73 |
| Abandoned Applications | 181 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16488933
[patent_doc_number] => 20200382547
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-03
[patent_title] => SYSTEMS AND METHODS FOR AUTOMATED DETECTION OF CYBERSECURITY PERFORMANCE GAPS
[patent_app_type] => utility
[patent_app_number] => 16/888666
[patent_app_country] => US
[patent_app_date] => 2020-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5177
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 145
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16888666
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/888666 | Systems and methods for automated detection of cybersecurity performance gaps | May 29, 2020 | Issued |
Array
(
[id] => 17819515
[patent_doc_number] => 11425145
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-23
[patent_title] => Methods and systems for provisioning cloud computing services
[patent_app_type] => utility
[patent_app_number] => 16/880969
[patent_app_country] => US
[patent_app_date] => 2020-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10084
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 252
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16880969
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/880969 | Methods and systems for provisioning cloud computing services | May 20, 2020 | Issued |
Array
(
[id] => 18330949
[patent_doc_number] => 11636193
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-04-25
[patent_title] => Intuition-based challenges
[patent_app_type] => utility
[patent_app_number] => 16/868221
[patent_app_country] => US
[patent_app_date] => 2020-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 14722
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16868221
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/868221 | Intuition-based challenges | May 5, 2020 | Issued |
Array
(
[id] => 16567511
[patent_doc_number] => 10892892
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-01-12
[patent_title] => Method and apparatus for end-to-end secure sharing of information with multiple recipients without maintaining a key directory
[patent_app_type] => utility
[patent_app_number] => 16/864732
[patent_app_country] => US
[patent_app_date] => 2020-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5326
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 50
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16864732
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/864732 | Method and apparatus for end-to-end secure sharing of information with multiple recipients without maintaining a key directory | Apr 30, 2020 | Issued |
Array
(
[id] => 16874690
[patent_doc_number] => 20210168157
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-06-03
[patent_title] => VISUALIZATION TOOL FOR REAL-TIME NETWORK RISK ASSESSMENT
[patent_app_type] => utility
[patent_app_number] => 16/863933
[patent_app_country] => US
[patent_app_date] => 2020-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8434
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16863933
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/863933 | Visualization tool for real-time network risk assessment | Apr 29, 2020 | Issued |
Array
(
[id] => 16242594
[patent_doc_number] => 20200259828
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-13
[patent_title] => PROVIDING ACCESS CONTROL AND IDENTITY VERIFICATION FOR COMMUNICATIONS WHEN INITIATING A COMMUNICATION TO AN ENTITY TO BE VERIFIED
[patent_app_type] => utility
[patent_app_number] => 16/861663
[patent_app_country] => US
[patent_app_date] => 2020-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20746
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -34
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16861663
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/861663 | Providing access control and identity verification for communications when initiating a communication to an entity to be verified | Apr 28, 2020 | Issued |
Array
(
[id] => 17190073
[patent_doc_number] => 20210336958
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-10-28
[patent_title] => SYSTEM FOR AUTOMATED ELECTRONIC DATA EXFILTRATION PATH IDENTIFICATION, PRIORITIZATION, AND REMEDIATION
[patent_app_type] => utility
[patent_app_number] => 16/856316
[patent_app_country] => US
[patent_app_date] => 2020-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7569
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16856316
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/856316 | System for automated electronic data exfiltration path identification, prioritization, and remediation | Apr 22, 2020 | Issued |
Array
(
[id] => 18416882
[patent_doc_number] => 11671433
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-06-06
[patent_title] => Data loss prevention incident forwarding
[patent_app_type] => utility
[patent_app_number] => 16/853862
[patent_app_country] => US
[patent_app_date] => 2020-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 9963
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16853862
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/853862 | Data loss prevention incident forwarding | Apr 20, 2020 | Issued |
Array
(
[id] => 17223746
[patent_doc_number] => 11176247
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-16
[patent_title] => System and method for container assessment using sandboxing
[patent_app_type] => utility
[patent_app_number] => 16/838903
[patent_app_country] => US
[patent_app_date] => 2020-04-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4720
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16838903
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/838903 | System and method for container assessment using sandboxing | Apr 1, 2020 | Issued |
Array
(
[id] => 17116844
[patent_doc_number] => 20210297441
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-09-23
[patent_title] => SYSTEM AND METHOD FOR DETERMINING CYBERSECURITY RATING AND RISK SCORING
[patent_app_type] => utility
[patent_app_number] => 16/822691
[patent_app_country] => US
[patent_app_date] => 2020-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14087
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -32
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16822691
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/822691 | System and method for determining cybersecurity rating and risk scoring | Mar 17, 2020 | Issued |
Array
(
[id] => 16623756
[patent_doc_number] => 20210042409
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-11
[patent_title] => CROSS-NETWORK SECURITY EVALUATION
[patent_app_type] => utility
[patent_app_number] => 16/823282
[patent_app_country] => US
[patent_app_date] => 2020-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3477
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 68
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16823282
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/823282 | Cross-network security evaluation | Mar 17, 2020 | Issued |
Array
(
[id] => 18130428
[patent_doc_number] => 11556639
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-17
[patent_title] => Method for automatic creation of malware detection signature
[patent_app_type] => utility
[patent_app_number] => 16/816972
[patent_app_country] => US
[patent_app_date] => 2020-03-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5607
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 346
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16816972
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/816972 | Method for automatic creation of malware detection signature | Mar 11, 2020 | Issued |
Array
(
[id] => 17977629
[patent_doc_number] => 11494491
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-08
[patent_title] => Systems and methods for protecting against malware code injections in trusted processes by a multi-target injector
[patent_app_type] => utility
[patent_app_number] => 16/812615
[patent_app_country] => US
[patent_app_date] => 2020-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 8010
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16812615
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/812615 | Systems and methods for protecting against malware code injections in trusted processes by a multi-target injector | Mar 8, 2020 | Issued |
Array
(
[id] => 17624193
[patent_doc_number] => 11343264
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-24
[patent_title] => System and method for determining the confidence level in attributing a cyber campaign to an activity group
[patent_app_type] => utility
[patent_app_number] => 16/813605
[patent_app_country] => US
[patent_app_date] => 2020-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 3576
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 356
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16813605
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/813605 | System and method for determining the confidence level in attributing a cyber campaign to an activity group | Mar 8, 2020 | Issued |
Array
(
[id] => 18554148
[patent_doc_number] => 20230252161
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-08-10
[patent_title] => METHODS OF EVALUATING SOURCE CODE USING NUMERIC ARRAY REPRESENTATIONS OF SOURCE CODE ELEMENTS
[patent_app_type] => utility
[patent_app_number] => 17/797747
[patent_app_country] => US
[patent_app_date] => 2022-02-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9960
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17797747
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/797747 | Methods of evaluating source code using numeric array representations of source code elements | Feb 9, 2020 | Issued |
Array
(
[id] => 17411259
[patent_doc_number] => 11252166
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-02-15
[patent_title] => Providing data authorization based on blockchain
[patent_app_type] => utility
[patent_app_number] => 16/779488
[patent_app_country] => US
[patent_app_date] => 2020-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 12
[patent_no_of_words] => 14409
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 291
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16779488
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/779488 | Providing data authorization based on blockchain | Jan 30, 2020 | Issued |
Array
(
[id] => 17565401
[patent_doc_number] => 20220129550
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-04-28
[patent_title] => Method for constructing behavioural software signatures
[patent_app_type] => utility
[patent_app_number] => 17/430922
[patent_app_country] => US
[patent_app_date] => 2020-01-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6492
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17430922
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/430922 | Method for constructing behavioural software signatures | Jan 29, 2020 | Issued |
Array
(
[id] => 17047038
[patent_doc_number] => 11100220
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-24
[patent_title] => Data type recognition, model training and risk recognition methods, apparatuses and devices
[patent_app_type] => utility
[patent_app_number] => 16/774663
[patent_app_country] => US
[patent_app_date] => 2020-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6647
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16774663
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/774663 | Data type recognition, model training and risk recognition methods, apparatuses and devices | Jan 27, 2020 | Issued |
Array
(
[id] => 16937779
[patent_doc_number] => 20210203668
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-07-01
[patent_title] => SYSTEMS AND METHODS FOR MALICIOUS CLIENT DETECTION THROUGH PROPERTY ANALYSIS
[patent_app_type] => utility
[patent_app_number] => 16/731501
[patent_app_country] => US
[patent_app_date] => 2019-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7943
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16731501
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/731501 | Systems and methods for malicious client detection through property analysis | Dec 30, 2019 | Issued |
Array
(
[id] => 17729420
[patent_doc_number] => 11385807
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-07-12
[patent_title] => System and method for recovering a node in a cloud infastructure after an intrusion
[patent_app_type] => utility
[patent_app_number] => 16/731988
[patent_app_country] => US
[patent_app_date] => 2019-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6579
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16731988
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/731988 | System and method for recovering a node in a cloud infastructure after an intrusion | Dec 30, 2019 | Issued |