Search

Gregory R. Delcotto

Examiner (ID: 9291, Phone: (571)272-1312 , Office: P/1761 )

Most Active Art Unit
1761
Art Unit(s)
1751, 1796, 1105, 1761, 0
Total Applications
2643
Issued Applications
1396
Pending Applications
285
Abandoned Applications
985

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 18388187 [patent_doc_number] => 11658987 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-05-23 [patent_title] => Dynamic fraudulent user blacklist to detect fraudulent user activity with near real-time capabilities [patent_app_type] => utility [patent_app_number] => 17/142664 [patent_app_country] => US [patent_app_date] => 2021-01-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7719 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 233 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17142664 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/142664
Dynamic fraudulent user blacklist to detect fraudulent user activity with near real-time capabilities Jan 5, 2021 Issued
Array ( [id] => 17909594 [patent_doc_number] => 11463470 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-10-04 [patent_title] => Network security management for a building automation system [patent_app_type] => utility [patent_app_number] => 17/136883 [patent_app_country] => US [patent_app_date] => 2020-12-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 10538 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 298 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17136883 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/136883
Network security management for a building automation system Dec 28, 2020 Issued
Array ( [id] => 18048920 [patent_doc_number] => 11522884 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2022-12-06 [patent_title] => Subscription and key management system [patent_app_type] => utility [patent_app_number] => 17/133411 [patent_app_country] => US [patent_app_date] => 2020-12-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 10 [patent_no_of_words] => 13346 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 186 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17133411 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/133411
Subscription and key management system Dec 22, 2020 Issued
Array ( [id] => 18132185 [patent_doc_number] => 11558405 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-01-17 [patent_title] => Real-time prevention of malicious content via dynamic analysis [patent_app_type] => utility [patent_app_number] => 17/128639 [patent_app_country] => US [patent_app_date] => 2020-12-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6270 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 181 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17128639 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/128639
Real-time prevention of malicious content via dynamic analysis Dec 20, 2020 Issued
Array ( [id] => 17693716 [patent_doc_number] => 20220201009 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-06-23 [patent_title] => CREATING AND HANDLING WORKSPACE INDICATORS OF COMPROMISE (IOC) BASED UPON CONFIGURATION DRIFT [patent_app_type] => utility [patent_app_number] => 17/126122 [patent_app_country] => US [patent_app_date] => 2020-12-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 19442 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 103 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17126122 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/126122
Creating and handling workspace indicators of compromise (IOC) based upon configuration drift Dec 17, 2020 Issued
Array ( [id] => 17418118 [patent_doc_number] => 20220053023 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-02-17 [patent_title] => ACTIVE FINGERPRINTING FOR TRANSPORT LAYER SECURITY (TLS) SERVERS [patent_app_type] => utility [patent_app_number] => 17/125283 [patent_app_country] => US [patent_app_date] => 2020-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14259 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 254 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17125283 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/125283
Active fingerprinting for transport layer security (TLS) servers Dec 16, 2020 Issued
Array ( [id] => 18132195 [patent_doc_number] => 11558415 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2023-01-17 [patent_title] => Real time application protection system risk identification and mitigation [patent_app_type] => utility [patent_app_number] => 17/122681 [patent_app_country] => US [patent_app_date] => 2020-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4183 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 217 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17122681 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/122681
Real time application protection system risk identification and mitigation Dec 14, 2020 Issued
Array ( [id] => 16732323 [patent_doc_number] => 20210099472 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-04-01 [patent_title] => ENFORCING THREAT POLICY ACTIONS BASED ON NETWORK ADDRESSES OF HOST THREATS [patent_app_type] => utility [patent_app_number] => 17/247461 [patent_app_country] => US [patent_app_date] => 2020-12-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11968 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17247461 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/247461
Enforcing threat policy actions based on network addresses of host threats Dec 10, 2020 Issued
Array ( [id] => 18163201 [patent_doc_number] => 20230029794 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-02-02 [patent_title] => CUSTOMIZED ANOMALY DETECTION [patent_app_type] => utility [patent_app_number] => 17/783240 [patent_app_country] => US [patent_app_date] => 2020-11-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6644 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 65 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17783240 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/783240
Customized anomaly detection Nov 16, 2020 Issued
Array ( [id] => 19794999 [patent_doc_number] => 12235948 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-02-25 [patent_title] => Public key encryption using self powered timers [patent_app_type] => utility [patent_app_number] => 17/755692 [patent_app_country] => US [patent_app_date] => 2020-11-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 32 [patent_figures_cnt] => 33 [patent_no_of_words] => 9235 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 108 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17755692 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/755692
Public key encryption using self powered timers Nov 5, 2020 Issued
Array ( [id] => 16751647 [patent_doc_number] => 20210103656 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-04-08 [patent_title] => METHOD AND APPARATUS USING VIRTUAL ISOLATION LAYER IN DATA SECURITY [patent_app_type] => utility [patent_app_number] => 17/090924 [patent_app_country] => US [patent_app_date] => 2020-11-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 1682 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 51 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17090924 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/090924
Method and apparatus using virtual isolation layer in data security Nov 5, 2020 Issued
Array ( [id] => 17567739 [patent_doc_number] => 20220131889 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-04-28 [patent_title] => ADAPTIVE SECURITY FOR RESOURCE CONSTRAINT DEVICES [patent_app_type] => utility [patent_app_number] => 17/082348 [patent_app_country] => US [patent_app_date] => 2020-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11059 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 108 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17082348 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/082348
Adaptive security for resource constraint devices Oct 27, 2020 Issued
Array ( [id] => 18489335 [patent_doc_number] => 20230216686 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-07-06 [patent_title] => USER AUTHENTICATION SYSTEM, USER AUTHENTICATION SERVER, AND USER AUTHENTICATION METHOD [patent_app_type] => utility [patent_app_number] => 17/288236 [patent_app_country] => US [patent_app_date] => 2020-10-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10118 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -8 [patent_words_short_claim] => 362 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17288236 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/288236
User authentication system, user authentication server, and user authentication method Oct 21, 2020 Issued
Array ( [id] => 17204610 [patent_doc_number] => 20210344705 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-11-04 [patent_title] => METHOD FOR REGISTERING EDGE COMPUTING ACCESS AND AN EDGE COMPUTING NODE DEVICE [patent_app_type] => utility [patent_app_number] => 17/072295 [patent_app_country] => US [patent_app_date] => 2020-10-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5157 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -13 [patent_words_short_claim] => 102 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17072295 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/072295
METHOD FOR REGISTERING EDGE COMPUTING ACCESS AND AN EDGE COMPUTING NODE DEVICE Oct 15, 2020 Abandoned
Array ( [id] => 18579967 [patent_doc_number] => 11736512 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2023-08-22 [patent_title] => Methods for automatically preventing data exfiltration and devices thereof [patent_app_type] => utility [patent_app_number] => 17/069180 [patent_app_country] => US [patent_app_date] => 2020-10-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 8122 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 238 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17069180 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/069180
Methods for automatically preventing data exfiltration and devices thereof Oct 12, 2020 Issued
Array ( [id] => 17863804 [patent_doc_number] => 11444971 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-09-13 [patent_title] => Method for assessing the quality of network-related indicators of compromise [patent_app_type] => utility [patent_app_number] => 17/064010 [patent_app_country] => US [patent_app_date] => 2020-10-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7712 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 337 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17064010 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/064010
Method for assessing the quality of network-related indicators of compromise Oct 5, 2020 Issued
Array ( [id] => 17788836 [patent_doc_number] => 11411982 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-08-09 [patent_title] => Systems and methods for graphical visualization of web application vulnerabilities [patent_app_type] => utility [patent_app_number] => 17/034636 [patent_app_country] => US [patent_app_date] => 2020-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 6076 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 150 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17034636 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/034636
Systems and methods for graphical visualization of web application vulnerabilities Sep 27, 2020 Issued
Array ( [id] => 17575190 [patent_doc_number] => 11323472 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-05-03 [patent_title] => Identifying automated responses to security threats based on obtained communication interactions [patent_app_type] => utility [patent_app_number] => 17/033146 [patent_app_country] => US [patent_app_date] => 2020-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4533 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 200 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17033146 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/033146
Identifying automated responses to security threats based on obtained communication interactions Sep 24, 2020 Issued
Array ( [id] => 17487196 [patent_doc_number] => 20220094700 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-03-24 [patent_title] => INTERFACE THREAT ASSESSMENT IN MULTI-CLUSTER SYSTEM [patent_app_type] => utility [patent_app_number] => 17/027272 [patent_app_country] => US [patent_app_date] => 2020-09-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5631 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 198 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17027272 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/027272
Interface threat assessment in multi-cluster system Sep 20, 2020 Issued
Array ( [id] => 18001926 [patent_doc_number] => 11503048 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-11-15 [patent_title] => Prioritizing assets using security metrics [patent_app_type] => utility [patent_app_number] => 17/026093 [patent_app_country] => US [patent_app_date] => 2020-09-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 16925 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 180 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17026093 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/026093
Prioritizing assets using security metrics Sep 17, 2020 Issued
Menu