
Erick David Glass
Examiner (ID: 17455, Phone: (571)272-8395 , Office: P/2837 )
| Most Active Art Unit | 2837 |
| Art Unit(s) | 2837, 2846 |
| Total Applications | 1433 |
| Issued Applications | 1291 |
| Pending Applications | 61 |
| Abandoned Applications | 114 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 16454709
[patent_doc_number] => 20200364135
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-19
[patent_title] => AUTOMATED SECURITY ANALYSIS OF BASEBAND FIRMWARE
[patent_app_type] => utility
[patent_app_number] => 15/931855
[patent_app_country] => US
[patent_app_date] => 2020-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4674
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 69
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15931855
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/931855 | Automated security analysis of baseband firmware | May 13, 2020 | Issued |
Array
(
[id] => 16457280
[patent_doc_number] => 20200366706
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-19
[patent_title] => MANAGING SUPERSEDENCE OF SOLUTIONS FOR SECURITY ISSUES AMONG ASSETS OF AN ENTERPRISE NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/874087
[patent_app_country] => US
[patent_app_date] => 2020-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17235
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 155
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16874087
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/874087 | Managing supersedence of solutions for security issues among assets of an enterprise network | May 13, 2020 | Issued |
Array
(
[id] => 16441480
[patent_doc_number] => 20200358807
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-12
[patent_title] => SYSTEM AND METHOD FOR CYBER SECURITY THREAT ASSESSMENT
[patent_app_type] => utility
[patent_app_number] => 16/870573
[patent_app_country] => US
[patent_app_date] => 2020-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7242
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16870573
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/870573 | System and method for cyber security threat assessment | May 7, 2020 | Issued |
Array
(
[id] => 17218758
[patent_doc_number] => 20210352096
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-11
[patent_title] => AUTOMATICALLY DETECTING VULNERABILITY REMEDIATIONS AND REGRESSIONS
[patent_app_type] => utility
[patent_app_number] => 16/867153
[patent_app_country] => US
[patent_app_date] => 2020-05-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7580
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16867153
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/867153 | Automatically detecting vulnerability remediations and regressions | May 4, 2020 | Issued |
Array
(
[id] => 16240770
[patent_doc_number] => 20200258004
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-13
[patent_title] => METHODS AND SYSTEMS FOR ANALYZING CYBERSECURITY THREATS
[patent_app_type] => utility
[patent_app_number] => 16/861636
[patent_app_country] => US
[patent_app_date] => 2020-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15602
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16861636
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/861636 | Methods and systems for analyzing cybersecurity threats | Apr 28, 2020 | Issued |
Array
(
[id] => 16240575
[patent_doc_number] => 20200257809
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-08-13
[patent_title] => MANAGING THE SHARING OF COMMON LIBRARY PACKAGES WITH SUBSCRIBERS
[patent_app_type] => utility
[patent_app_number] => 15/929335
[patent_app_country] => US
[patent_app_date] => 2020-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4523
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15929335
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/929335 | Managing the sharing of common library packages with subscribers | Apr 26, 2020 | Issued |
Array
(
[id] => 17639122
[patent_doc_number] => 11349863
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-31
[patent_title] => Assessing computer network risk
[patent_app_type] => utility
[patent_app_number] => 16/859884
[patent_app_country] => US
[patent_app_date] => 2020-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 18
[patent_no_of_words] => 11264
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16859884
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/859884 | Assessing computer network risk | Apr 26, 2020 | Issued |
Array
(
[id] => 16250523
[patent_doc_number] => 10749910
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-08-18
[patent_title] => Multidimensional vectors for analyzing and visually displaying identity permissions
[patent_app_type] => utility
[patent_app_number] => 16/857874
[patent_app_country] => US
[patent_app_date] => 2020-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 10604
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16857874
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/857874 | Multidimensional vectors for analyzing and visually displaying identity permissions | Apr 23, 2020 | Issued |
Array
(
[id] => 17131599
[patent_doc_number] => 20210306368
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-09-30
[patent_title] => MULTIPLE SOURCED CLASSIFICATION
[patent_app_type] => utility
[patent_app_number] => 16/834921
[patent_app_country] => US
[patent_app_date] => 2020-03-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15224
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16834921
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/834921 | Multiple sourced classification | Mar 29, 2020 | Issued |
Array
(
[id] => 20228620
[patent_doc_number] => 12417273
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-09-16
[patent_title] => Management system and method for user authentication on password based systems
[patent_app_type] => utility
[patent_app_number] => 17/914298
[patent_app_country] => US
[patent_app_date] => 2020-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 1210
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17914298
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/914298 | Management system and method for user authentication on password based systems | Mar 22, 2020 | Issued |
Array
(
[id] => 18157189
[patent_doc_number] => 11570190
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-31
[patent_title] => Detection of SSL / TLS malware beacons
[patent_app_type] => utility
[patent_app_number] => 16/825103
[patent_app_country] => US
[patent_app_date] => 2020-03-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6201
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16825103
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/825103 | Detection of SSL / TLS malware beacons | Mar 19, 2020 | Issued |
Array
(
[id] => 16122143
[patent_doc_number] => 20200213094
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-07-02
[patent_title] => LEDGER VERIFICATION METHOD AND APPARATUS, AND DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/815882
[patent_app_country] => US
[patent_app_date] => 2020-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6275
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16815882
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/815882 | Ledger verification method and apparatus, and device | Mar 10, 2020 | Issued |
Array
(
[id] => 17086584
[patent_doc_number] => 20210281591
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-09-09
[patent_title] => SYSTEMS AND METHODS FOR IDENTIFYING ACCESS ANOMALIES USING NETWORK GRAPHS
[patent_app_type] => utility
[patent_app_number] => 16/810765
[patent_app_country] => US
[patent_app_date] => 2020-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9260
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16810765
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/810765 | Systems and methods for identifying access anomalies using network graphs | Mar 4, 2020 | Issued |
Array
(
[id] => 17942757
[patent_doc_number] => 11477229
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-18
[patent_title] => Personalized security testing communication simulations
[patent_app_type] => utility
[patent_app_number] => 16/808620
[patent_app_country] => US
[patent_app_date] => 2020-03-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8538
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 83
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16808620
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/808620 | Personalized security testing communication simulations | Mar 3, 2020 | Issued |
Array
(
[id] => 17071757
[patent_doc_number] => 20210273975
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-09-02
[patent_title] => DETECTING MAC/IP SPOOFING ATTACKS ON NETWORKS
[patent_app_type] => utility
[patent_app_number] => 16/803950
[patent_app_country] => US
[patent_app_date] => 2020-02-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5619
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16803950
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/803950 | Detecting MAC/IP spoofing attacks on networks | Feb 26, 2020 | Issued |
Array
(
[id] => 17253158
[patent_doc_number] => 11188650
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-30
[patent_title] => Detection of malware using feature hashing
[patent_app_type] => utility
[patent_app_number] => 16/799419
[patent_app_country] => US
[patent_app_date] => 2020-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5063
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16799419
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/799419 | Detection of malware using feature hashing | Feb 23, 2020 | Issued |
Array
(
[id] => 16365631
[patent_doc_number] => 20200322382
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-08
[patent_title] => COLLABORATIVE SECURITY FOR APPLICATION LAYER ENCRYPTION
[patent_app_type] => utility
[patent_app_number] => 16/788999
[patent_app_country] => US
[patent_app_date] => 2020-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6563
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16788999
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/788999 | Collaborative security for application layer encryption | Feb 11, 2020 | Issued |
Array
(
[id] => 16023307
[patent_doc_number] => 20200186497
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-11
[patent_title] => Computer Security System and Method Based on User-Intended Final Destination
[patent_app_type] => utility
[patent_app_number] => 16/789035
[patent_app_country] => US
[patent_app_date] => 2020-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8810
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -4
[patent_words_short_claim] => 96
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16789035
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/789035 | Computer security system and method based on user-intended final destination | Feb 11, 2020 | Issued |
Array
(
[id] => 17926833
[patent_doc_number] => 11470106
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-10-11
[patent_title] => Exploitability risk model for assessing risk of cyberattacks
[patent_app_type] => utility
[patent_app_number] => 16/780699
[patent_app_country] => US
[patent_app_date] => 2020-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 14138
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16780699
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/780699 | Exploitability risk model for assessing risk of cyberattacks | Feb 2, 2020 | Issued |
Array
(
[id] => 16235046
[patent_doc_number] => 10742619
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-08-11
[patent_title] => Secure authentication for a computing environment
[patent_app_type] => utility
[patent_app_number] => 16/751901
[patent_app_country] => US
[patent_app_date] => 2020-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 22409
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16751901
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/751901 | Secure authentication for a computing environment | Jan 23, 2020 | Issued |