
Michael Eurice
Examiner (ID: 8076, Phone: (571)270-5957 , Office: P/2693 )
| Most Active Art Unit | 2693 |
| Art Unit(s) | 2629, 2693 |
| Total Applications | 643 |
| Issued Applications | 518 |
| Pending Applications | 1 |
| Abandoned Applications | 126 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15623389
[patent_doc_number] => 20200082099
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-12
[patent_title] => IDENTIFYING COMPUTER PROGRAM SECURITY ACCESS CONTROL VIOLATIONS USING STATIC ANALYSIS
[patent_app_type] => utility
[patent_app_number] => 16/676035
[patent_app_country] => US
[patent_app_date] => 2019-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11156
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 113
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16676035
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/676035 | Identifying computer program security access control violations using static analysis | Nov 5, 2019 | Issued |
Array
(
[id] => 15875619
[patent_doc_number] => 20200145213
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-07
[patent_title] => IOT SECURITY MECHANISMS FOR INDUSTRIAL APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 16/676048
[patent_app_country] => US
[patent_app_date] => 2019-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6178
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 48
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16676048
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/676048 | IOT security mechanisms for industrial applications | Nov 5, 2019 | Issued |
Array
(
[id] => 18121395
[patent_doc_number] => 11552799
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-01-10
[patent_title] => Storage architecture providing improved modification of access rights for stored data
[patent_app_type] => utility
[patent_app_number] => 16/673989
[patent_app_country] => US
[patent_app_date] => 2019-11-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5732
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16673989
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/673989 | Storage architecture providing improved modification of access rights for stored data | Nov 4, 2019 | Issued |
Array
(
[id] => 17062209
[patent_doc_number] => 11106814
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-08-31
[patent_title] => System, method and apparatus for securely storing data on public networks
[patent_app_type] => utility
[patent_app_number] => 16/673854
[patent_app_country] => US
[patent_app_date] => 2019-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 9410
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16673854
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/673854 | System, method and apparatus for securely storing data on public networks | Nov 3, 2019 | Issued |
Array
(
[id] => 16813288
[patent_doc_number] => 20210135843
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-06
[patent_title] => Centralized Transaction Tracking Using Multi-Blockchain Technology
[patent_app_type] => utility
[patent_app_number] => 16/668790
[patent_app_country] => US
[patent_app_date] => 2019-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5392
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16668790
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/668790 | Centralized transaction tracking using multi-blockchain technology | Oct 29, 2019 | Issued |
Array
(
[id] => 15562091
[patent_doc_number] => 20200065457
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-27
[patent_title] => MANUFACTURE OF SECURE PRINTED IMAGE INVENTORIES
[patent_app_type] => utility
[patent_app_number] => 16/669213
[patent_app_country] => US
[patent_app_date] => 2019-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6207
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -26
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16669213
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/669213 | Manufacture of secure printed image inventories | Oct 29, 2019 | Issued |
Array
(
[id] => 16795281
[patent_doc_number] => 20210125098
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-29
[patent_title] => RETRAINING INDIVIDUAL-ITEM MODELS
[patent_app_type] => utility
[patent_app_number] => 16/666728
[patent_app_country] => US
[patent_app_date] => 2019-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8864
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16666728
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/666728 | Retraining individual-item models | Oct 28, 2019 | Issued |
Array
(
[id] => 16472568
[patent_doc_number] => 20200374106
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-26
[patent_title] => SYSTEM OR METHOD TO IMPLEMENT RECORD LEVEL ACCESS ON METADATA DRIVEN BLOCKCHAIN USING SHARED SECRETS AND CONSENSUS ON READ
[patent_app_type] => utility
[patent_app_number] => 16/667847
[patent_app_country] => US
[patent_app_date] => 2019-10-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 63273
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16667847
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/667847 | System or method to implement record level access on metadata driven blockchain using shared secrets and consensus on read | Oct 28, 2019 | Issued |
Array
(
[id] => 17167234
[patent_doc_number] => 11153349
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-19
[patent_title] => Inferential analysis using feedback for extracting and combining cyber risk information
[patent_app_type] => utility
[patent_app_number] => 16/662936
[patent_app_country] => US
[patent_app_date] => 2019-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 20506
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 270
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16662936
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/662936 | Inferential analysis using feedback for extracting and combining cyber risk information | Oct 23, 2019 | Issued |
Array
(
[id] => 15501119
[patent_doc_number] => 20200050748
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-13
[patent_title] => SECURITY CONTROL METHOD AND DEVICE OF APPLICATION, AND ELECTRONIC DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/660066
[patent_app_country] => US
[patent_app_date] => 2019-10-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9227
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16660066
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/660066 | Security control method and device of application, and electronic device | Oct 21, 2019 | Issued |
Array
(
[id] => 15743931
[patent_doc_number] => 20200110854
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-09
[patent_title] => INTEGRATION SERVICES SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR ECM-INDEPENDENT ETL TOOLS
[patent_app_type] => utility
[patent_app_number] => 16/658929
[patent_app_country] => US
[patent_app_date] => 2019-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19553
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 283
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16658929
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/658929 | Integration services systems, methods and computer program products for ECM-independent ETL tools | Oct 20, 2019 | Issued |
Array
(
[id] => 15777811
[patent_doc_number] => 20200119923
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-16
[patent_title] => DATA VERIFICATION
[patent_app_type] => utility
[patent_app_number] => 16/658227
[patent_app_country] => US
[patent_app_date] => 2019-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10936
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -30
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16658227
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/658227 | Data verification | Oct 20, 2019 | Issued |
Array
(
[id] => 17499674
[patent_doc_number] => 11288380
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-03-29
[patent_title] => Securely sharing selected fields in a blockchain with runtime access determination
[patent_app_type] => utility
[patent_app_number] => 16/601205
[patent_app_country] => US
[patent_app_date] => 2019-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 15178
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 196
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16601205
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/601205 | Securely sharing selected fields in a blockchain with runtime access determination | Oct 13, 2019 | Issued |
Array
(
[id] => 16395566
[patent_doc_number] => 20200336507
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-10-22
[patent_title] => GENERATIVE ATTACK INSTRUMENTATION FOR PENETRATION TESTING
[patent_app_type] => utility
[patent_app_number] => 16/599113
[patent_app_country] => US
[patent_app_date] => 2019-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7725
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 79
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16599113
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/599113 | GENERATIVE ATTACK INSTRUMENTATION FOR PENETRATION TESTING | Oct 9, 2019 | Abandoned |
Array
(
[id] => 15719959
[patent_doc_number] => 20200106747
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-02
[patent_title] => VPN DEEP PACKET INSPECTION
[patent_app_type] => utility
[patent_app_number] => 16/590253
[patent_app_country] => US
[patent_app_date] => 2019-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2300
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16590253
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/590253 | VPN deep packet inspection | Sep 30, 2019 | Issued |
Array
(
[id] => 15445017
[patent_doc_number] => 20200036692
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-30
[patent_title] => SYSTEM AND METHOD FOR PROVIDING CONTROLLED APPLICATION PROGRAMMING INTERFACE SECURITY
[patent_app_type] => utility
[patent_app_number] => 16/589165
[patent_app_country] => US
[patent_app_date] => 2019-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10346
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16589165
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/589165 | System and method for providing controlled application programming interface security | Sep 30, 2019 | Issued |
Array
(
[id] => 16790291
[patent_doc_number] => 10992737
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-27
[patent_title] => Systems and methods for interacting with media devices
[patent_app_type] => utility
[patent_app_number] => 16/587587
[patent_app_country] => US
[patent_app_date] => 2019-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11660
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16587587
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/587587 | Systems and methods for interacting with media devices | Sep 29, 2019 | Issued |
Array
(
[id] => 17033612
[patent_doc_number] => 11095436
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-17
[patent_title] => Key-based security for cloud services
[patent_app_type] => utility
[patent_app_number] => 16/588153
[patent_app_country] => US
[patent_app_date] => 2019-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5549
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 286
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16588153
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/588153 | Key-based security for cloud services | Sep 29, 2019 | Issued |
Array
(
[id] => 15417099
[patent_doc_number] => 20200028872
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-23
[patent_title] => DISASTER SCENARIO BASED INFERENTIAL ANALYSIS USING FEEDBACK FOR EXTRACTING AND COMBINING CYBER RISK INFORMATION
[patent_app_type] => utility
[patent_app_number] => 16/582977
[patent_app_country] => US
[patent_app_date] => 2019-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19819
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16582977
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/582977 | Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information | Sep 24, 2019 | Issued |
Array
(
[id] => 16724977
[patent_doc_number] => 20210092124
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-25
[patent_title] => REAL-TIME MANAGEMENT OF ACCESS CONTROLS
[patent_app_type] => utility
[patent_app_number] => 16/576129
[patent_app_country] => US
[patent_app_date] => 2019-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9365
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16576129
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/576129 | Real-time management of access controls | Sep 18, 2019 | Issued |