Search

Michael Eurice

Examiner (ID: 8076, Phone: (571)270-5957 , Office: P/2693 )

Most Active Art Unit
2693
Art Unit(s)
2629, 2693
Total Applications
643
Issued Applications
518
Pending Applications
1
Abandoned Applications
126

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 15623389 [patent_doc_number] => 20200082099 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-03-12 [patent_title] => IDENTIFYING COMPUTER PROGRAM SECURITY ACCESS CONTROL VIOLATIONS USING STATIC ANALYSIS [patent_app_type] => utility [patent_app_number] => 16/676035 [patent_app_country] => US [patent_app_date] => 2019-11-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11156 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 113 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16676035 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/676035
Identifying computer program security access control violations using static analysis Nov 5, 2019 Issued
Array ( [id] => 15875619 [patent_doc_number] => 20200145213 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-05-07 [patent_title] => IOT SECURITY MECHANISMS FOR INDUSTRIAL APPLICATIONS [patent_app_type] => utility [patent_app_number] => 16/676048 [patent_app_country] => US [patent_app_date] => 2019-11-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6178 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 48 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16676048 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/676048
IOT security mechanisms for industrial applications Nov 5, 2019 Issued
Array ( [id] => 18121395 [patent_doc_number] => 11552799 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2023-01-10 [patent_title] => Storage architecture providing improved modification of access rights for stored data [patent_app_type] => utility [patent_app_number] => 16/673989 [patent_app_country] => US [patent_app_date] => 2019-11-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5732 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 260 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16673989 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/673989
Storage architecture providing improved modification of access rights for stored data Nov 4, 2019 Issued
Array ( [id] => 17062209 [patent_doc_number] => 11106814 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-08-31 [patent_title] => System, method and apparatus for securely storing data on public networks [patent_app_type] => utility [patent_app_number] => 16/673854 [patent_app_country] => US [patent_app_date] => 2019-11-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 9410 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 98 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16673854 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/673854
System, method and apparatus for securely storing data on public networks Nov 3, 2019 Issued
Array ( [id] => 16813288 [patent_doc_number] => 20210135843 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-05-06 [patent_title] => Centralized Transaction Tracking Using Multi-Blockchain Technology [patent_app_type] => utility [patent_app_number] => 16/668790 [patent_app_country] => US [patent_app_date] => 2019-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5392 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16668790 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/668790
Centralized transaction tracking using multi-blockchain technology Oct 29, 2019 Issued
Array ( [id] => 15562091 [patent_doc_number] => 20200065457 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-02-27 [patent_title] => MANUFACTURE OF SECURE PRINTED IMAGE INVENTORIES [patent_app_type] => utility [patent_app_number] => 16/669213 [patent_app_country] => US [patent_app_date] => 2019-10-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6207 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -26 [patent_words_short_claim] => 101 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16669213 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/669213
Manufacture of secure printed image inventories Oct 29, 2019 Issued
Array ( [id] => 16795281 [patent_doc_number] => 20210125098 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-04-29 [patent_title] => RETRAINING INDIVIDUAL-ITEM MODELS [patent_app_type] => utility [patent_app_number] => 16/666728 [patent_app_country] => US [patent_app_date] => 2019-10-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8864 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16666728 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/666728
Retraining individual-item models Oct 28, 2019 Issued
Array ( [id] => 16472568 [patent_doc_number] => 20200374106 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-11-26 [patent_title] => SYSTEM OR METHOD TO IMPLEMENT RECORD LEVEL ACCESS ON METADATA DRIVEN BLOCKCHAIN USING SHARED SECRETS AND CONSENSUS ON READ [patent_app_type] => utility [patent_app_number] => 16/667847 [patent_app_country] => US [patent_app_date] => 2019-10-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 63273 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 146 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16667847 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/667847
System or method to implement record level access on metadata driven blockchain using shared secrets and consensus on read Oct 28, 2019 Issued
Array ( [id] => 17167234 [patent_doc_number] => 11153349 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-10-19 [patent_title] => Inferential analysis using feedback for extracting and combining cyber risk information [patent_app_type] => utility [patent_app_number] => 16/662936 [patent_app_country] => US [patent_app_date] => 2019-10-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 20506 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 270 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16662936 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/662936
Inferential analysis using feedback for extracting and combining cyber risk information Oct 23, 2019 Issued
Array ( [id] => 15501119 [patent_doc_number] => 20200050748 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-02-13 [patent_title] => SECURITY CONTROL METHOD AND DEVICE OF APPLICATION, AND ELECTRONIC DEVICE [patent_app_type] => utility [patent_app_number] => 16/660066 [patent_app_country] => US [patent_app_date] => 2019-10-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9227 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 81 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16660066 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/660066
Security control method and device of application, and electronic device Oct 21, 2019 Issued
Array ( [id] => 15743931 [patent_doc_number] => 20200110854 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-04-09 [patent_title] => INTEGRATION SERVICES SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR ECM-INDEPENDENT ETL TOOLS [patent_app_type] => utility [patent_app_number] => 16/658929 [patent_app_country] => US [patent_app_date] => 2019-10-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 19553 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 283 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16658929 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/658929
Integration services systems, methods and computer program products for ECM-independent ETL tools Oct 20, 2019 Issued
Array ( [id] => 15777811 [patent_doc_number] => 20200119923 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-04-16 [patent_title] => DATA VERIFICATION [patent_app_type] => utility [patent_app_number] => 16/658227 [patent_app_country] => US [patent_app_date] => 2019-10-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10936 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -30 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16658227 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/658227
Data verification Oct 20, 2019 Issued
Array ( [id] => 17499674 [patent_doc_number] => 11288380 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-03-29 [patent_title] => Securely sharing selected fields in a blockchain with runtime access determination [patent_app_type] => utility [patent_app_number] => 16/601205 [patent_app_country] => US [patent_app_date] => 2019-10-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 15178 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 196 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16601205 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/601205
Securely sharing selected fields in a blockchain with runtime access determination Oct 13, 2019 Issued
Array ( [id] => 16395566 [patent_doc_number] => 20200336507 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-10-22 [patent_title] => GENERATIVE ATTACK INSTRUMENTATION FOR PENETRATION TESTING [patent_app_type] => utility [patent_app_number] => 16/599113 [patent_app_country] => US [patent_app_date] => 2019-10-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7725 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 79 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16599113 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/599113
GENERATIVE ATTACK INSTRUMENTATION FOR PENETRATION TESTING Oct 9, 2019 Abandoned
Array ( [id] => 15719959 [patent_doc_number] => 20200106747 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-04-02 [patent_title] => VPN DEEP PACKET INSPECTION [patent_app_type] => utility [patent_app_number] => 16/590253 [patent_app_country] => US [patent_app_date] => 2019-10-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2300 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16590253 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/590253
VPN deep packet inspection Sep 30, 2019 Issued
Array ( [id] => 15445017 [patent_doc_number] => 20200036692 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-30 [patent_title] => SYSTEM AND METHOD FOR PROVIDING CONTROLLED APPLICATION PROGRAMMING INTERFACE SECURITY [patent_app_type] => utility [patent_app_number] => 16/589165 [patent_app_country] => US [patent_app_date] => 2019-10-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10346 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16589165 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/589165
System and method for providing controlled application programming interface security Sep 30, 2019 Issued
Array ( [id] => 16790291 [patent_doc_number] => 10992737 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-04-27 [patent_title] => Systems and methods for interacting with media devices [patent_app_type] => utility [patent_app_number] => 16/587587 [patent_app_country] => US [patent_app_date] => 2019-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 11660 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 116 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16587587 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/587587
Systems and methods for interacting with media devices Sep 29, 2019 Issued
Array ( [id] => 17033612 [patent_doc_number] => 11095436 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-08-17 [patent_title] => Key-based security for cloud services [patent_app_type] => utility [patent_app_number] => 16/588153 [patent_app_country] => US [patent_app_date] => 2019-09-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5549 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 286 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16588153 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/588153
Key-based security for cloud services Sep 29, 2019 Issued
Array ( [id] => 15417099 [patent_doc_number] => 20200028872 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-23 [patent_title] => DISASTER SCENARIO BASED INFERENTIAL ANALYSIS USING FEEDBACK FOR EXTRACTING AND COMBINING CYBER RISK INFORMATION [patent_app_type] => utility [patent_app_number] => 16/582977 [patent_app_country] => US [patent_app_date] => 2019-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 19819 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 103 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16582977 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/582977
Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information Sep 24, 2019 Issued
Array ( [id] => 16724977 [patent_doc_number] => 20210092124 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-03-25 [patent_title] => REAL-TIME MANAGEMENT OF ACCESS CONTROLS [patent_app_type] => utility [patent_app_number] => 16/576129 [patent_app_country] => US [patent_app_date] => 2019-09-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9365 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 103 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16576129 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/576129
Real-time management of access controls Sep 18, 2019 Issued
Menu