
Gregory R. Delcotto
Examiner (ID: 9291, Phone: (571)272-1312 , Office: P/1761 )
| Most Active Art Unit | 1761 |
| Art Unit(s) | 1751, 1796, 1105, 1761, 0 |
| Total Applications | 2643 |
| Issued Applications | 1396 |
| Pending Applications | 285 |
| Abandoned Applications | 985 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18388187
[patent_doc_number] => 11658987
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-05-23
[patent_title] => Dynamic fraudulent user blacklist to detect fraudulent user activity with near real-time capabilities
[patent_app_type] => utility
[patent_app_number] => 17/142664
[patent_app_country] => US
[patent_app_date] => 2021-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7719
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 233
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17142664
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/142664 | Dynamic fraudulent user blacklist to detect fraudulent user activity with near real-time capabilities | Jan 5, 2021 | Issued |
Array
(
[id] => 17909594
[patent_doc_number] => 11463470
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-04
[patent_title] => Network security management for a building automation system
[patent_app_type] => utility
[patent_app_number] => 17/136883
[patent_app_country] => US
[patent_app_date] => 2020-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 10538
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 298
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17136883
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/136883 | Network security management for a building automation system | Dec 28, 2020 | Issued |
Array
(
[id] => 18048920
[patent_doc_number] => 11522884
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-12-06
[patent_title] => Subscription and key management system
[patent_app_type] => utility
[patent_app_number] => 17/133411
[patent_app_country] => US
[patent_app_date] => 2020-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 13346
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17133411
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/133411 | Subscription and key management system | Dec 22, 2020 | Issued |
Array
(
[id] => 18132185
[patent_doc_number] => 11558405
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-01-17
[patent_title] => Real-time prevention of malicious content via dynamic analysis
[patent_app_type] => utility
[patent_app_number] => 17/128639
[patent_app_country] => US
[patent_app_date] => 2020-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6270
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17128639
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/128639 | Real-time prevention of malicious content via dynamic analysis | Dec 20, 2020 | Issued |
Array
(
[id] => 17693716
[patent_doc_number] => 20220201009
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-06-23
[patent_title] => CREATING AND HANDLING WORKSPACE INDICATORS OF COMPROMISE (IOC) BASED UPON CONFIGURATION DRIFT
[patent_app_type] => utility
[patent_app_number] => 17/126122
[patent_app_country] => US
[patent_app_date] => 2020-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19442
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17126122
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/126122 | Creating and handling workspace indicators of compromise (IOC) based upon configuration drift | Dec 17, 2020 | Issued |
Array
(
[id] => 17418118
[patent_doc_number] => 20220053023
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-02-17
[patent_title] => ACTIVE FINGERPRINTING FOR TRANSPORT LAYER SECURITY (TLS) SERVERS
[patent_app_type] => utility
[patent_app_number] => 17/125283
[patent_app_country] => US
[patent_app_date] => 2020-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14259
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 254
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17125283
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/125283 | Active fingerprinting for transport layer security (TLS) servers | Dec 16, 2020 | Issued |
Array
(
[id] => 18132195
[patent_doc_number] => 11558415
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-01-17
[patent_title] => Real time application protection system risk identification and mitigation
[patent_app_type] => utility
[patent_app_number] => 17/122681
[patent_app_country] => US
[patent_app_date] => 2020-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4183
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17122681
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/122681 | Real time application protection system risk identification and mitigation | Dec 14, 2020 | Issued |
Array
(
[id] => 16732323
[patent_doc_number] => 20210099472
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-01
[patent_title] => ENFORCING THREAT POLICY ACTIONS BASED ON NETWORK ADDRESSES OF HOST THREATS
[patent_app_type] => utility
[patent_app_number] => 17/247461
[patent_app_country] => US
[patent_app_date] => 2020-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11968
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17247461
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/247461 | Enforcing threat policy actions based on network addresses of host threats | Dec 10, 2020 | Issued |
Array
(
[id] => 18163201
[patent_doc_number] => 20230029794
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-02-02
[patent_title] => CUSTOMIZED ANOMALY DETECTION
[patent_app_type] => utility
[patent_app_number] => 17/783240
[patent_app_country] => US
[patent_app_date] => 2020-11-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6644
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 65
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17783240
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/783240 | Customized anomaly detection | Nov 16, 2020 | Issued |
Array
(
[id] => 19794999
[patent_doc_number] => 12235948
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-02-25
[patent_title] => Public key encryption using self powered timers
[patent_app_type] => utility
[patent_app_number] => 17/755692
[patent_app_country] => US
[patent_app_date] => 2020-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 32
[patent_figures_cnt] => 33
[patent_no_of_words] => 9235
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17755692
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/755692 | Public key encryption using self powered timers | Nov 5, 2020 | Issued |
Array
(
[id] => 16751647
[patent_doc_number] => 20210103656
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-08
[patent_title] => METHOD AND APPARATUS USING VIRTUAL ISOLATION LAYER IN DATA SECURITY
[patent_app_type] => utility
[patent_app_number] => 17/090924
[patent_app_country] => US
[patent_app_date] => 2020-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1682
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 51
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17090924
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/090924 | Method and apparatus using virtual isolation layer in data security | Nov 5, 2020 | Issued |
Array
(
[id] => 17567739
[patent_doc_number] => 20220131889
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-04-28
[patent_title] => ADAPTIVE SECURITY FOR RESOURCE CONSTRAINT DEVICES
[patent_app_type] => utility
[patent_app_number] => 17/082348
[patent_app_country] => US
[patent_app_date] => 2020-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11059
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17082348
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/082348 | Adaptive security for resource constraint devices | Oct 27, 2020 | Issued |
Array
(
[id] => 18489335
[patent_doc_number] => 20230216686
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-07-06
[patent_title] => USER AUTHENTICATION SYSTEM, USER AUTHENTICATION SERVER, AND USER AUTHENTICATION METHOD
[patent_app_type] => utility
[patent_app_number] => 17/288236
[patent_app_country] => US
[patent_app_date] => 2020-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10118
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 362
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17288236
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/288236 | User authentication system, user authentication server, and user authentication method | Oct 21, 2020 | Issued |
Array
(
[id] => 17204610
[patent_doc_number] => 20210344705
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-11-04
[patent_title] => METHOD FOR REGISTERING EDGE COMPUTING ACCESS AND AN EDGE COMPUTING NODE DEVICE
[patent_app_type] => utility
[patent_app_number] => 17/072295
[patent_app_country] => US
[patent_app_date] => 2020-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5157
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17072295
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/072295 | METHOD FOR REGISTERING EDGE COMPUTING ACCESS AND AN EDGE COMPUTING NODE DEVICE | Oct 15, 2020 | Abandoned |
Array
(
[id] => 18579967
[patent_doc_number] => 11736512
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-08-22
[patent_title] => Methods for automatically preventing data exfiltration and devices thereof
[patent_app_type] => utility
[patent_app_number] => 17/069180
[patent_app_country] => US
[patent_app_date] => 2020-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8122
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 238
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17069180
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/069180 | Methods for automatically preventing data exfiltration and devices thereof | Oct 12, 2020 | Issued |
Array
(
[id] => 17863804
[patent_doc_number] => 11444971
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-09-13
[patent_title] => Method for assessing the quality of network-related indicators of compromise
[patent_app_type] => utility
[patent_app_number] => 17/064010
[patent_app_country] => US
[patent_app_date] => 2020-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7712
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 337
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17064010
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/064010 | Method for assessing the quality of network-related indicators of compromise | Oct 5, 2020 | Issued |
Array
(
[id] => 17788836
[patent_doc_number] => 11411982
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-09
[patent_title] => Systems and methods for graphical visualization of web application vulnerabilities
[patent_app_type] => utility
[patent_app_number] => 17/034636
[patent_app_country] => US
[patent_app_date] => 2020-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6076
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17034636
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/034636 | Systems and methods for graphical visualization of web application vulnerabilities | Sep 27, 2020 | Issued |
Array
(
[id] => 17575190
[patent_doc_number] => 11323472
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-05-03
[patent_title] => Identifying automated responses to security threats based on obtained communication interactions
[patent_app_type] => utility
[patent_app_number] => 17/033146
[patent_app_country] => US
[patent_app_date] => 2020-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4533
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17033146
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/033146 | Identifying automated responses to security threats based on obtained communication interactions | Sep 24, 2020 | Issued |
Array
(
[id] => 17487196
[patent_doc_number] => 20220094700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-24
[patent_title] => INTERFACE THREAT ASSESSMENT IN MULTI-CLUSTER SYSTEM
[patent_app_type] => utility
[patent_app_number] => 17/027272
[patent_app_country] => US
[patent_app_date] => 2020-09-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5631
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17027272
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/027272 | Interface threat assessment in multi-cluster system | Sep 20, 2020 | Issued |
Array
(
[id] => 18001926
[patent_doc_number] => 11503048
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-15
[patent_title] => Prioritizing assets using security metrics
[patent_app_type] => utility
[patent_app_number] => 17/026093
[patent_app_country] => US
[patent_app_date] => 2020-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 16925
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17026093
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/026093 | Prioritizing assets using security metrics | Sep 17, 2020 | Issued |