
Erick David Glass
Examiner (ID: 17455, Phone: (571)272-8395 , Office: P/2837 )
| Most Active Art Unit | 2837 |
| Art Unit(s) | 2837, 2846 |
| Total Applications | 1433 |
| Issued Applications | 1291 |
| Pending Applications | 61 |
| Abandoned Applications | 114 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18563941
[patent_doc_number] => 11729201
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-08-15
[patent_title] => Enterprise security assessment and management service for serverless environments
[patent_app_type] => utility
[patent_app_number] => 17/120876
[patent_app_country] => US
[patent_app_date] => 2020-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 7268
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17120876
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/120876 | Enterprise security assessment and management service for serverless environments | Dec 13, 2020 | Issued |
Array
(
[id] => 18191605
[patent_doc_number] => 11582219
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-02-14
[patent_title] => Methods and systems for controlling access to a protected resource
[patent_app_type] => utility
[patent_app_number] => 17/104071
[patent_app_country] => US
[patent_app_date] => 2020-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 7787
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17104071
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/104071 | Methods and systems for controlling access to a protected resource | Nov 24, 2020 | Issued |
Array
(
[id] => 18447749
[patent_doc_number] => 11683331
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-06-20
[patent_title] => Trust scoring of network entities in networks
[patent_app_type] => utility
[patent_app_number] => 16/949996
[patent_app_country] => US
[patent_app_date] => 2020-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8677
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16949996
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/949996 | Trust scoring of network entities in networks | Nov 22, 2020 | Issued |
Array
(
[id] => 17600694
[patent_doc_number] => 20220150269
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-05-12
[patent_title] => METHODS AND SYSTEMS FOR TESTING NETWORK SECURITY
[patent_app_type] => utility
[patent_app_number] => 17/093165
[patent_app_country] => US
[patent_app_date] => 2020-11-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5842
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17093165
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/093165 | METHODS AND SYSTEMS FOR TESTING NETWORK SECURITY | Nov 8, 2020 | Abandoned |
Array
(
[id] => 16988746
[patent_doc_number] => 11075941
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-07-27
[patent_title] => Risk control method, risk control apparatus, electronic device, and storage medium
[patent_app_type] => utility
[patent_app_number] => 17/083946
[patent_app_country] => US
[patent_app_date] => 2020-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 5578
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17083946
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/083946 | Risk control method, risk control apparatus, electronic device, and storage medium | Oct 28, 2020 | Issued |
Array
(
[id] => 18508409
[patent_doc_number] => 11706241
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-07-18
[patent_title] => Security model utilizing multi-channel data
[patent_app_type] => utility
[patent_app_number] => 17/081275
[patent_app_country] => US
[patent_app_date] => 2020-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 26461
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17081275
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/081275 | Security model utilizing multi-channel data | Oct 26, 2020 | Issued |
Array
(
[id] => 16659444
[patent_doc_number] => 20210056081
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-25
[patent_title] => Securing Access to Confidential Data Using a Blockchain Ledger
[patent_app_type] => utility
[patent_app_number] => 17/078469
[patent_app_country] => US
[patent_app_date] => 2020-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6630
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17078469
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/078469 | Securing access to confidential data using a blockchain ledger | Oct 22, 2020 | Issued |
Array
(
[id] => 18875746
[patent_doc_number] => 11863578
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-01-02
[patent_title] => Cyber vulnerability assessment tool threat assessment heuristie
[patent_app_type] => utility
[patent_app_number] => 16/949154
[patent_app_country] => US
[patent_app_date] => 2020-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 11594
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16949154
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/949154 | Cyber vulnerability assessment tool threat assessment heuristie | Oct 14, 2020 | Issued |
Array
(
[id] => 18521306
[patent_doc_number] => 11711205
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-25
[patent_title] => Unified secure device provisioning
[patent_app_type] => utility
[patent_app_number] => 17/028827
[patent_app_country] => US
[patent_app_date] => 2020-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7536
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17028827
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/028827 | Unified secure device provisioning | Sep 21, 2020 | Issued |
Array
(
[id] => 16546341
[patent_doc_number] => 20200412756
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-31
[patent_title] => COMMUNICATION CONTROL DEVICE, ANOMALY DETECTION ELECTRONIC CONTROL UNIT, MOBILITY NETWORK SYSTEM, COMMUNICATION CONTROL METHOD, ANOMALY DETECTION METHOD, AND RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 17/015569
[patent_app_country] => US
[patent_app_date] => 2020-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16235
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17015569
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/015569 | Communication control device, anomaly detection electronic control unit, mobility network system, communication control method, anomaly detection method, and recording medium | Sep 8, 2020 | Issued |
Array
(
[id] => 17449692
[patent_doc_number] => 20220070197
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-03
[patent_title] => SYSTEMS AND METHODS FOR DETECTING VULNERABILITIES IN NETWORK PROCESSES DURING RUNTIME
[patent_app_type] => utility
[patent_app_number] => 17/003450
[patent_app_country] => US
[patent_app_date] => 2020-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11211
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 60
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17003450
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/003450 | Systems and methods for detecting vulnerabilities in network processes during runtime | Aug 25, 2020 | Issued |
Array
(
[id] => 16472761
[patent_doc_number] => 20200374299
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-26
[patent_title] => CLIENT REPUTATION DRIVEN ROLE-BASED ACCESS CONTROL
[patent_app_type] => utility
[patent_app_number] => 16/992704
[patent_app_country] => US
[patent_app_date] => 2020-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11507
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16992704
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/992704 | Client reputation driven role-based access control | Aug 12, 2020 | Issued |
Array
(
[id] => 18089590
[patent_doc_number] => 11539735
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-12-27
[patent_title] => Systems and methods for application placement in a network based on host security posture
[patent_app_type] => utility
[patent_app_number] => 16/985520
[patent_app_country] => US
[patent_app_date] => 2020-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 13279
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16985520
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/985520 | Systems and methods for application placement in a network based on host security posture | Aug 4, 2020 | Issued |
Array
(
[id] => 16618355
[patent_doc_number] => 20210037008
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-04
[patent_title] => ARCHITECTURE FOR CLOUDCHAIN DRIVEN ECOSYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/940207
[patent_app_country] => US
[patent_app_date] => 2020-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 23207
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16940207
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/940207 | Architecture for cloudchain driven ecosystem | Jul 26, 2020 | Issued |
Array
(
[id] => 16537712
[patent_doc_number] => 10880336
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-12-29
[patent_title] => Multidimensional vectors for analyzing and visually displaying identity permissions
[patent_app_type] => utility
[patent_app_number] => 16/936832
[patent_app_country] => US
[patent_app_date] => 2020-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 10639
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16936832
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/936832 | Multidimensional vectors for analyzing and visually displaying identity permissions | Jul 22, 2020 | Issued |
Array
(
[id] => 16897362
[patent_doc_number] => 11038927
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-06-15
[patent_title] => Multidimensional vectors for analyzing and visually displaying identity permissions
[patent_app_type] => utility
[patent_app_number] => 16/936516
[patent_app_country] => US
[patent_app_date] => 2020-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 10639
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16936516
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/936516 | Multidimensional vectors for analyzing and visually displaying identity permissions | Jul 22, 2020 | Issued |
Array
(
[id] => 18482030
[patent_doc_number] => 11695795
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-04
[patent_title] => Evaluating effectiveness of security controls in enterprise networks using graph values
[patent_app_type] => utility
[patent_app_number] => 16/925583
[patent_app_country] => US
[patent_app_date] => 2020-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11550
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16925583
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/925583 | Evaluating effectiveness of security controls in enterprise networks using graph values | Jul 9, 2020 | Issued |
Array
(
[id] => 16587229
[patent_doc_number] => 20210021631
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-21
[patent_title] => Cyberattack Forecasting Using Predictive Information
[patent_app_type] => utility
[patent_app_number] => 16/898618
[patent_app_country] => US
[patent_app_date] => 2020-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6087
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16898618
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/898618 | Cyberattack forecasting using predictive information | Jun 10, 2020 | Issued |
Array
(
[id] => 17501759
[patent_doc_number] => 11290480
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-03-29
[patent_title] => Network vulnerability assessment tool
[patent_app_type] => utility
[patent_app_number] => 16/883443
[patent_app_country] => US
[patent_app_date] => 2020-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 4997
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 391
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16883443
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/883443 | Network vulnerability assessment tool | May 25, 2020 | Issued |
Array
(
[id] => 18547299
[patent_doc_number] => 11720652
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-08-08
[patent_title] => Monitoring a computing device to automatically obtain data in response to detecting background activity
[patent_app_type] => utility
[patent_app_number] => 16/882336
[patent_app_country] => US
[patent_app_date] => 2020-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 10614
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16882336
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/882336 | Monitoring a computing device to automatically obtain data in response to detecting background activity | May 21, 2020 | Issued |