
Bryan R. Fischmann
Examiner (ID: 979)
| Most Active Art Unit | 3618 |
| Art Unit(s) | 3611, 3618 |
| Total Applications | 547 |
| Issued Applications | 419 |
| Pending Applications | 17 |
| Abandoned Applications | 111 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15486903
[patent_doc_number] => 10558802
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-11
[patent_title] => Moving target defenses for data storage devices
[patent_app_type] => utility
[patent_app_number] => 16/453563
[patent_app_country] => US
[patent_app_date] => 2019-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3107
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16453563
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/453563 | Moving target defenses for data storage devices | Jun 25, 2019 | Issued |
Array
(
[id] => 17041536
[patent_doc_number] => 20210258172
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-08-19
[patent_title] => METHOD FOR MONITORING DIGITAL CERTIFICATES
[patent_app_type] => utility
[patent_app_number] => 17/252209
[patent_app_country] => US
[patent_app_date] => 2019-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5805
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 509
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17252209
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/252209 | METHOD FOR MONITORING DIGITAL CERTIFICATES | Jun 24, 2019 | Abandoned |
Array
(
[id] => 15302071
[patent_doc_number] => 20190394171
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-26
[patent_title] => SYSTEMS AND METHODS FOR SECURING COMMUNICATIONS
[patent_app_type] => utility
[patent_app_number] => 16/450934
[patent_app_country] => US
[patent_app_date] => 2019-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20301
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 74
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16450934
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/450934 | Systems and methods for securing communications | Jun 23, 2019 | Issued |
Array
(
[id] => 16516952
[patent_doc_number] => 20200396210
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-17
[patent_title] => DATA SECURITY TOOL
[patent_app_type] => utility
[patent_app_number] => 16/437598
[patent_app_country] => US
[patent_app_date] => 2019-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4066
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16437598
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/437598 | Data security tool | Jun 10, 2019 | Issued |
Array
(
[id] => 14877499
[patent_doc_number] => 20190288991
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-19
[patent_title] => EFFICIENT USE OF KEYSTREAMS
[patent_app_type] => utility
[patent_app_number] => 16/430003
[patent_app_country] => US
[patent_app_date] => 2019-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12913
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16430003
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/430003 | Efficient use of keystreams | Jun 2, 2019 | Issued |
Array
(
[id] => 15215599
[patent_doc_number] => 20190370486
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-05
[patent_title] => BLOCKCHAIN-BASED TRANSACTION PROCESSING METHOD AND APPARATUS
[patent_app_type] => utility
[patent_app_number] => 16/424683
[patent_app_country] => US
[patent_app_date] => 2019-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12656
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16424683
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/424683 | Blockchain-based transaction processing method and apparatus | May 28, 2019 | Issued |
Array
(
[id] => 16173925
[patent_doc_number] => 10715512
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-14
[patent_title] => Controlled token distribution to protect against malicious data and resource access
[patent_app_type] => utility
[patent_app_number] => 16/421925
[patent_app_country] => US
[patent_app_date] => 2019-05-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 23631
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 310
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16421925
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/421925 | Controlled token distribution to protect against malicious data and resource access | May 23, 2019 | Issued |
Array
(
[id] => 16472731
[patent_doc_number] => 20200374269
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-26
[patent_title] => SECURE AUDIO SYSTEMS AND METHODS
[patent_app_type] => utility
[patent_app_number] => 16/420105
[patent_app_country] => US
[patent_app_date] => 2019-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6570
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16420105
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/420105 | SECURE AUDIO SYSTEMS AND METHODS | May 21, 2019 | Abandoned |
Array
(
[id] => 14814245
[patent_doc_number] => 20190273732
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-05
[patent_title] => CUSTOM AUTHENTICATOR FOR ENTERPRISE WEB APPLICATION
[patent_app_type] => utility
[patent_app_number] => 16/420049
[patent_app_country] => US
[patent_app_date] => 2019-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11558
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16420049
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/420049 | Custom authenticator for enterprise web application | May 21, 2019 | Issued |
Array
(
[id] => 14814249
[patent_doc_number] => 20190273734
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-05
[patent_title] => CONFIGURING CREDENTIALS TO FACILTATE SHARING DATA IN A SECURE MANNER
[patent_app_type] => utility
[patent_app_number] => 16/420033
[patent_app_country] => US
[patent_app_date] => 2019-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13184
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16420033
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/420033 | Configuring credentials to faciltate sharing data in a secure manner | May 21, 2019 | Issued |
Array
(
[id] => 17736910
[patent_doc_number] => 20220222369
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-14
[patent_title] => INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM
[patent_app_type] => utility
[patent_app_number] => 17/607794
[patent_app_country] => US
[patent_app_date] => 2019-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 23269
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17607794
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/607794 | Information processing apparatus, information processing method and program | May 20, 2019 | Issued |
Array
(
[id] => 15957491
[patent_doc_number] => 10666670
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-26
[patent_title] => Managing security breaches in a networked computing environment
[patent_app_type] => utility
[patent_app_number] => 16/416624
[patent_app_country] => US
[patent_app_date] => 2019-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8322
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16416624
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/416624 | Managing security breaches in a networked computing environment | May 19, 2019 | Issued |
Array
(
[id] => 15643331
[patent_doc_number] => 10594687
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-17
[patent_title] => Technologies for enhancing computer security
[patent_app_type] => utility
[patent_app_number] => 16/406321
[patent_app_country] => US
[patent_app_date] => 2019-05-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7517
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16406321
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/406321 | Technologies for enhancing computer security | May 7, 2019 | Issued |
Array
(
[id] => 17739624
[patent_doc_number] => 20220225086
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-07-14
[patent_title] => PRIVACY MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 17/607745
[patent_app_country] => US
[patent_app_date] => 2019-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6091
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17607745
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/607745 | Privacy management | May 6, 2019 | Issued |
Array
(
[id] => 16049833
[patent_doc_number] => 10686809
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-06-16
[patent_title] => Data protection in a networked computing environment
[patent_app_type] => utility
[patent_app_number] => 16/404236
[patent_app_country] => US
[patent_app_date] => 2019-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8618
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16404236
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/404236 | Data protection in a networked computing environment | May 5, 2019 | Issued |
Array
(
[id] => 17470961
[patent_doc_number] => 11277449
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-03-15
[patent_title] => Adaptive distributive data protection system
[patent_app_type] => utility
[patent_app_number] => 16/402495
[patent_app_country] => US
[patent_app_date] => 2019-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 6867
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16402495
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/402495 | Adaptive distributive data protection system | May 2, 2019 | Issued |
Array
(
[id] => 16426086
[patent_doc_number] => 20200351284
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-05
[patent_title] => GENERATING SUMMARIES OF MESSAGES ASSOCIATED WITH ASSETS IN AN ENTERPRISE SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/402313
[patent_app_country] => US
[patent_app_date] => 2019-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8841
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 262
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16402313
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/402313 | Generating summaries of messages associated with assets in an enterprise system | May 2, 2019 | Issued |
Array
(
[id] => 18494707
[patent_doc_number] => 11700132
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-07-11
[patent_title] => Systems and methods for secure event and log management
[patent_app_type] => utility
[patent_app_number] => 16/402228
[patent_app_country] => US
[patent_app_date] => 2019-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7302
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16402228
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/402228 | Systems and methods for secure event and log management | May 2, 2019 | Issued |
Array
(
[id] => 16425888
[patent_doc_number] => 20200351086
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-05
[patent_title] => METHOD OF OPERATION OF A QUANTUM KEY CONTROLLER
[patent_app_type] => utility
[patent_app_number] => 16/403467
[patent_app_country] => US
[patent_app_date] => 2019-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13032
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16403467
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/403467 | Method of operation of a quantum key controller | May 2, 2019 | Issued |
Array
(
[id] => 15735033
[patent_doc_number] => 10615960
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-07
[patent_title] => Blockchain data protection using homomorphic encryption
[patent_app_type] => utility
[patent_app_number] => 16/390626
[patent_app_country] => US
[patent_app_date] => 2019-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9169
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16390626
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/390626 | Blockchain data protection using homomorphic encryption | Apr 21, 2019 | Issued |