Search

Erick David Glass

Examiner (ID: 17455, Phone: (571)272-8395 , Office: P/2837 )

Most Active Art Unit
2837
Art Unit(s)
2837, 2846
Total Applications
1433
Issued Applications
1291
Pending Applications
61
Abandoned Applications
114

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 16454709 [patent_doc_number] => 20200364135 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-11-19 [patent_title] => AUTOMATED SECURITY ANALYSIS OF BASEBAND FIRMWARE [patent_app_type] => utility [patent_app_number] => 15/931855 [patent_app_country] => US [patent_app_date] => 2020-05-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4674 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 69 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15931855 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/931855
Automated security analysis of baseband firmware May 13, 2020 Issued
Array ( [id] => 16457280 [patent_doc_number] => 20200366706 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-11-19 [patent_title] => MANAGING SUPERSEDENCE OF SOLUTIONS FOR SECURITY ISSUES AMONG ASSETS OF AN ENTERPRISE NETWORK [patent_app_type] => utility [patent_app_number] => 16/874087 [patent_app_country] => US [patent_app_date] => 2020-05-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 17235 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -27 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16874087 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/874087
Managing supersedence of solutions for security issues among assets of an enterprise network May 13, 2020 Issued
Array ( [id] => 16441480 [patent_doc_number] => 20200358807 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-11-12 [patent_title] => SYSTEM AND METHOD FOR CYBER SECURITY THREAT ASSESSMENT [patent_app_type] => utility [patent_app_number] => 16/870573 [patent_app_country] => US [patent_app_date] => 2020-05-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7242 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -20 [patent_words_short_claim] => 119 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16870573 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/870573
System and method for cyber security threat assessment May 7, 2020 Issued
Array ( [id] => 17218758 [patent_doc_number] => 20210352096 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-11-11 [patent_title] => AUTOMATICALLY DETECTING VULNERABILITY REMEDIATIONS AND REGRESSIONS [patent_app_type] => utility [patent_app_number] => 16/867153 [patent_app_country] => US [patent_app_date] => 2020-05-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7580 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 164 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16867153 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/867153
Automatically detecting vulnerability remediations and regressions May 4, 2020 Issued
Array ( [id] => 16240770 [patent_doc_number] => 20200258004 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-08-13 [patent_title] => METHODS AND SYSTEMS FOR ANALYZING CYBERSECURITY THREATS [patent_app_type] => utility [patent_app_number] => 16/861636 [patent_app_country] => US [patent_app_date] => 2020-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15602 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => 0 [patent_words_short_claim] => 84 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16861636 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/861636
Methods and systems for analyzing cybersecurity threats Apr 28, 2020 Issued
Array ( [id] => 16240575 [patent_doc_number] => 20200257809 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-08-13 [patent_title] => MANAGING THE SHARING OF COMMON LIBRARY PACKAGES WITH SUBSCRIBERS [patent_app_type] => utility [patent_app_number] => 15/929335 [patent_app_country] => US [patent_app_date] => 2020-04-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4523 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 142 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15929335 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/929335
Managing the sharing of common library packages with subscribers Apr 26, 2020 Issued
Array ( [id] => 17639122 [patent_doc_number] => 11349863 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-05-31 [patent_title] => Assessing computer network risk [patent_app_type] => utility [patent_app_number] => 16/859884 [patent_app_country] => US [patent_app_date] => 2020-04-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 18 [patent_no_of_words] => 11264 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 166 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16859884 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/859884
Assessing computer network risk Apr 26, 2020 Issued
Array ( [id] => 16250523 [patent_doc_number] => 10749910 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-08-18 [patent_title] => Multidimensional vectors for analyzing and visually displaying identity permissions [patent_app_type] => utility [patent_app_number] => 16/857874 [patent_app_country] => US [patent_app_date] => 2020-04-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 7 [patent_no_of_words] => 10604 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 218 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16857874 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/857874
Multidimensional vectors for analyzing and visually displaying identity permissions Apr 23, 2020 Issued
Array ( [id] => 17131599 [patent_doc_number] => 20210306368 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-09-30 [patent_title] => MULTIPLE SOURCED CLASSIFICATION [patent_app_type] => utility [patent_app_number] => 16/834921 [patent_app_country] => US [patent_app_date] => 2020-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15224 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16834921 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/834921
Multiple sourced classification Mar 29, 2020 Issued
Array ( [id] => 20228620 [patent_doc_number] => 12417273 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-09-16 [patent_title] => Management system and method for user authentication on password based systems [patent_app_type] => utility [patent_app_number] => 17/914298 [patent_app_country] => US [patent_app_date] => 2020-03-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 1210 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 82 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17914298 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/914298
Management system and method for user authentication on password based systems Mar 22, 2020 Issued
Array ( [id] => 18157189 [patent_doc_number] => 11570190 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-01-31 [patent_title] => Detection of SSL / TLS malware beacons [patent_app_type] => utility [patent_app_number] => 16/825103 [patent_app_country] => US [patent_app_date] => 2020-03-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6201 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 126 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16825103 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/825103
Detection of SSL / TLS malware beacons Mar 19, 2020 Issued
Array ( [id] => 16122143 [patent_doc_number] => 20200213094 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-07-02 [patent_title] => LEDGER VERIFICATION METHOD AND APPARATUS, AND DEVICE [patent_app_type] => utility [patent_app_number] => 16/815882 [patent_app_country] => US [patent_app_date] => 2020-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6275 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 239 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16815882 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/815882
Ledger verification method and apparatus, and device Mar 10, 2020 Issued
Array ( [id] => 17086584 [patent_doc_number] => 20210281591 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-09-09 [patent_title] => SYSTEMS AND METHODS FOR IDENTIFYING ACCESS ANOMALIES USING NETWORK GRAPHS [patent_app_type] => utility [patent_app_number] => 16/810765 [patent_app_country] => US [patent_app_date] => 2020-03-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9260 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 255 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16810765 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/810765
Systems and methods for identifying access anomalies using network graphs Mar 4, 2020 Issued
Array ( [id] => 17942757 [patent_doc_number] => 11477229 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-10-18 [patent_title] => Personalized security testing communication simulations [patent_app_type] => utility [patent_app_number] => 16/808620 [patent_app_country] => US [patent_app_date] => 2020-03-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8538 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 83 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16808620 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/808620
Personalized security testing communication simulations Mar 3, 2020 Issued
Array ( [id] => 17071757 [patent_doc_number] => 20210273975 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-09-02 [patent_title] => DETECTING MAC/IP SPOOFING ATTACKS ON NETWORKS [patent_app_type] => utility [patent_app_number] => 16/803950 [patent_app_country] => US [patent_app_date] => 2020-02-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5619 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16803950 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/803950
Detecting MAC/IP spoofing attacks on networks Feb 26, 2020 Issued
Array ( [id] => 17253158 [patent_doc_number] => 11188650 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-11-30 [patent_title] => Detection of malware using feature hashing [patent_app_type] => utility [patent_app_number] => 16/799419 [patent_app_country] => US [patent_app_date] => 2020-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5063 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 152 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16799419 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/799419
Detection of malware using feature hashing Feb 23, 2020 Issued
Array ( [id] => 16365631 [patent_doc_number] => 20200322382 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-10-08 [patent_title] => COLLABORATIVE SECURITY FOR APPLICATION LAYER ENCRYPTION [patent_app_type] => utility [patent_app_number] => 16/788999 [patent_app_country] => US [patent_app_date] => 2020-02-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6563 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 96 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16788999 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/788999
Collaborative security for application layer encryption Feb 11, 2020 Issued
Array ( [id] => 16023307 [patent_doc_number] => 20200186497 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-06-11 [patent_title] => Computer Security System and Method Based on User-Intended Final Destination [patent_app_type] => utility [patent_app_number] => 16/789035 [patent_app_country] => US [patent_app_date] => 2020-02-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8810 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -4 [patent_words_short_claim] => 96 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16789035 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/789035
Computer security system and method based on user-intended final destination Feb 11, 2020 Issued
Array ( [id] => 17926833 [patent_doc_number] => 11470106 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2022-10-11 [patent_title] => Exploitability risk model for assessing risk of cyberattacks [patent_app_type] => utility [patent_app_number] => 16/780699 [patent_app_country] => US [patent_app_date] => 2020-02-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 14138 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16780699 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/780699
Exploitability risk model for assessing risk of cyberattacks Feb 2, 2020 Issued
Array ( [id] => 16235046 [patent_doc_number] => 10742619 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-08-11 [patent_title] => Secure authentication for a computing environment [patent_app_type] => utility [patent_app_number] => 16/751901 [patent_app_country] => US [patent_app_date] => 2020-01-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 22409 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 248 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16751901 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/751901
Secure authentication for a computing environment Jan 23, 2020 Issued
Menu