Search

Asfand M. Sheikh

Examiner (ID: 11798, Phone: (571)272-1466 , Office: P/3627 )

Most Active Art Unit
3627
Art Unit(s)
3627, 3626
Total Applications
709
Issued Applications
293
Pending Applications
62
Abandoned Applications
361

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 17560141 [patent_doc_number] => 11316875 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-04-26 [patent_title] => Method and system for analyzing cybersecurity threats and improving defensive intelligence [patent_app_type] => utility [patent_app_number] => 17/162483 [patent_app_country] => US [patent_app_date] => 2021-01-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 11109 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 101 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17162483 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/162483
Method and system for analyzing cybersecurity threats and improving defensive intelligence Jan 28, 2021 Issued
Array ( [id] => 19182731 [patent_doc_number] => 11989320 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-05-21 [patent_title] => Hidden electronic file system within non-hidden electronic file system [patent_app_type] => utility [patent_app_number] => 17/156946 [patent_app_country] => US [patent_app_date] => 2021-01-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 5 [patent_no_of_words] => 4656 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 181 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17156946 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/156946
Hidden electronic file system within non-hidden electronic file system Jan 24, 2021 Issued
Array ( [id] => 17710160 [patent_doc_number] => 20220210168 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-06-30 [patent_title] => FACILITATING IDENTIFICATION OF COMPROMISED DEVICES BY NETWORK ACCESS CONTROL (NAC) OR UNIFIED THREAT MANAGEMENT (UTM) SECURITY SERVICES BY LEVERAGING CONTEXT FROM AN ENDPOINT DETECTION AND RESPONSE (EDR) AGENT [patent_app_type] => utility [patent_app_number] => 17/139896 [patent_app_country] => US [patent_app_date] => 2020-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8605 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 114 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17139896 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/139896
Facilitating identification of compromised devices by network access control (NAC) or unified threat management (UTM) security services by leveraging context from an endpoint detection and response (EDR) agent Dec 30, 2020 Issued
Array ( [id] => 16859513 [patent_doc_number] => 20210160258 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-05-27 [patent_title] => THREAT MITIGATION SYSTEM AND METHOD [patent_app_type] => utility [patent_app_number] => 17/105125 [patent_app_country] => US [patent_app_date] => 2020-11-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 26341 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -27 [patent_words_short_claim] => 47 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17105125 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/105125
Threat mitigation system and method Nov 24, 2020 Issued
Array ( [id] => 17478674 [patent_doc_number] => 20220086178 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-03-17 [patent_title] => EFFICIENT MONITORING OF NETWORK ACTIVITY IN A CLOUD COMPUTING ENVIRONMENT [patent_app_type] => utility [patent_app_number] => 17/018355 [patent_app_country] => US [patent_app_date] => 2020-09-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11751 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 104 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17018355 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/018355
Efficient monitoring of network activity in a cloud computing environment Sep 10, 2020 Issued
Array ( [id] => 16678760 [patent_doc_number] => 20210067526 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-03-04 [patent_title] => SECURITY MONITORING AT OPERATING SYSTEM KERNEL LEVEL [patent_app_type] => utility [patent_app_number] => 16/991592 [patent_app_country] => US [patent_app_date] => 2020-08-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18879 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 94 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16991592 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/991592
Security monitoring at operating system kernel level Aug 11, 2020 Issued
Array ( [id] => 18549146 [patent_doc_number] => 11722510 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-08-08 [patent_title] => Monitoring and preventing remote user automated cyber attacks [patent_app_type] => utility [patent_app_number] => 16/988863 [patent_app_country] => US [patent_app_date] => 2020-08-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 11 [patent_no_of_words] => 12322 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 193 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16988863 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/988863
Monitoring and preventing remote user automated cyber attacks Aug 9, 2020 Issued
Array ( [id] => 18001941 [patent_doc_number] => 11503063 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-11-15 [patent_title] => Systems and methods for detecting hidden vulnerabilities in enterprise networks [patent_app_type] => utility [patent_app_number] => 16/985605 [patent_app_country] => US [patent_app_date] => 2020-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 11016 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 90 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16985605 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/985605
Systems and methods for detecting hidden vulnerabilities in enterprise networks Aug 4, 2020 Issued
Array ( [id] => 17819521 [patent_doc_number] => 11425151 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-08-23 [patent_title] => Client-side attack detection via simulation [patent_app_type] => utility [patent_app_number] => 16/985737 [patent_app_country] => US [patent_app_date] => 2020-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 9822 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 187 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16985737 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/985737
Client-side attack detection via simulation Aug 4, 2020 Issued
Array ( [id] => 18220468 [patent_doc_number] => 11595426 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-02-28 [patent_title] => Risk based virtual workspace delivery [patent_app_type] => utility [patent_app_number] => 16/937992 [patent_app_country] => US [patent_app_date] => 2020-07-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 8546 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 93 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16937992 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/937992
Risk based virtual workspace delivery Jul 23, 2020 Issued
Array ( [id] => 17218766 [patent_doc_number] => 20210352104 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-11-11 [patent_title] => DETECTING MALICIOUS ACTIVITY IN A CLUSTER [patent_app_type] => utility [patent_app_number] => 16/916648 [patent_app_country] => US [patent_app_date] => 2020-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9273 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16916648 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/916648
DETECTING MALICIOUS ACTIVITY IN A CLUSTER Jun 29, 2020 Abandoned
Array ( [id] => 16610387 [patent_doc_number] => 10911418 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-02-02 [patent_title] => Port level policy isolation in overlay networks [patent_app_type] => utility [patent_app_number] => 16/913114 [patent_app_country] => US [patent_app_date] => 2020-06-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 16925 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 285 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16913114 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/913114
Port level policy isolation in overlay networks Jun 25, 2020 Issued
Array ( [id] => 16906166 [patent_doc_number] => 20210185082 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-06-17 [patent_title] => COMPUTERIZED SYSTEM AND METHOD FOR SECURELY DISTRIBUTING AND EXCHANGING CYBER-THREAT INFORMATION IN A STANDARDIZED FORMAT [patent_app_type] => utility [patent_app_number] => 16/900446 [patent_app_country] => US [patent_app_date] => 2020-06-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8695 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -2 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16900446 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/900446
Computerized system and method for securely distributing and exchanging cyber-threat information in a standardized format Jun 11, 2020 Issued
Array ( [id] => 17942759 [patent_doc_number] => 11477231 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-10-18 [patent_title] => System and method for vulnerability remediation prioritization [patent_app_type] => utility [patent_app_number] => 16/897760 [patent_app_country] => US [patent_app_date] => 2020-06-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6976 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 215 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16897760 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/897760
System and method for vulnerability remediation prioritization Jun 9, 2020 Issued
Array ( [id] => 17279035 [patent_doc_number] => 20210385233 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-12-09 [patent_title] => TARGET AWARE ADAPTIVE APPLICATION FOR ANOMALY DETECTION AT THE NETWORK EDGE [patent_app_type] => utility [patent_app_number] => 16/895481 [patent_app_country] => US [patent_app_date] => 2020-06-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7476 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 182 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16895481 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/895481
Target aware adaptive application for anomaly detection at the network edge Jun 7, 2020 Issued
Array ( [id] => 16864841 [patent_doc_number] => 11023585 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-06-01 [patent_title] => Systems and methods for managing cybersecurity alerts [patent_app_type] => utility [patent_app_number] => 16/884607 [patent_app_country] => US [patent_app_date] => 2020-05-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 9104 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16884607 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/884607
Systems and methods for managing cybersecurity alerts May 26, 2020 Issued
Array ( [id] => 17218749 [patent_doc_number] => 20210352087 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-11-11 [patent_title] => QUANTUM COMPUTING MACHINE LEARNING FOR SECURITY THREATS [patent_app_type] => utility [patent_app_number] => 16/867586 [patent_app_country] => US [patent_app_date] => 2020-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12944 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -20 [patent_words_short_claim] => 84 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16867586 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/867586
Quantum computing machine learning for security threats May 5, 2020 Issued
Array ( [id] => 17887661 [patent_doc_number] => 20220303139 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-09-22 [patent_title] => METHOD FOR INSTALLING A COMPUTING COMPONENT AND ASSOCIATED ELECTRONIC DEVICE [patent_app_type] => utility [patent_app_number] => 17/610888 [patent_app_country] => US [patent_app_date] => 2020-04-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7627 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -11 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17610888 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/610888
Method for installing a computing component and associated electronic device Apr 14, 2020 Issued
Array ( [id] => 16195694 [patent_doc_number] => 20200236543 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-07-23 [patent_title] => WWAN-WLAN AGGREGATION SECURITY [patent_app_type] => utility [patent_app_number] => 16/843592 [patent_app_country] => US [patent_app_date] => 2020-04-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12725 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -44 [patent_words_short_claim] => 110 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16843592 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/843592
WWAN-WLAN aggregation security Apr 7, 2020 Issued
Array ( [id] => 17146320 [patent_doc_number] => 20210314333 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-10-07 [patent_title] => CHURN-AWARE MACHINE LEARNING FOR CYBERSECURITY THREAT DETECTION [patent_app_type] => utility [patent_app_number] => 16/842568 [patent_app_country] => US [patent_app_date] => 2020-04-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6774 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16842568 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/842568
Churn-aware machine learning for cybersecurity threat detection Apr 6, 2020 Issued
Menu