
Bryan R. Fischmann
Examiner (ID: 979)
| Most Active Art Unit | 3618 |
| Art Unit(s) | 3611, 3618 |
| Total Applications | 547 |
| Issued Applications | 419 |
| Pending Applications | 17 |
| Abandoned Applications | 111 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14400039
[patent_doc_number] => 10313319
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-04
[patent_title] => Efficient use of keystreams
[patent_app_type] => utility
[patent_app_number] => 15/945975
[patent_app_country] => US
[patent_app_date] => 2018-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12892
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15945975
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/945975 | Efficient use of keystreams | Apr 4, 2018 | Issued |
Array
(
[id] => 14369117
[patent_doc_number] => 10305881
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-28
[patent_title] => Controlled token distribution to protect against malicious data and resource access
[patent_app_type] => utility
[patent_app_number] => 15/911997
[patent_app_country] => US
[patent_app_date] => 2018-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 23621
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 279
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15911997
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/911997 | Controlled token distribution to protect against malicious data and resource access | Mar 4, 2018 | Issued |
Array
(
[id] => 13351183
[patent_doc_number] => 20180227131
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-09
[patent_title] => ELECTRONIC IDENTIFICATION VERIFICATION METHODS AND SYSTEMS WITH STORAGE OF CERTIFICATION RECORDS TO A SIDE CHAIN
[patent_app_type] => utility
[patent_app_number] => 15/893479
[patent_app_country] => US
[patent_app_date] => 2018-02-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16521
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -23
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15893479
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/893479 | Electronic identification verification methods and systems with storage of certification records to a side chain | Feb 8, 2018 | Issued |
Array
(
[id] => 16235034
[patent_doc_number] => 10742607
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-08-11
[patent_title] => Application-aware firewall policy enforcement by data center controller
[patent_app_type] => utility
[patent_app_number] => 15/890174
[patent_app_country] => US
[patent_app_date] => 2018-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9413
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15890174
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/890174 | Application-aware firewall policy enforcement by data center controller | Feb 5, 2018 | Issued |
Array
(
[id] => 13351181
[patent_doc_number] => 20180227130
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-09
[patent_title] => ELECTRONIC IDENTIFICATION VERIFICATION METHODS AND SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 15/890333
[patent_app_country] => US
[patent_app_date] => 2018-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17145
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15890333
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/890333 | Electronic identification verification methods and systems | Feb 5, 2018 | Issued |
Array
(
[id] => 14693169
[patent_doc_number] => 20190245700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-08
[patent_title] => Managing And Negotiating Certificates
[patent_app_type] => utility
[patent_app_number] => 15/890150
[patent_app_country] => US
[patent_app_date] => 2018-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13501
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15890150
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/890150 | Managing and negotiating certificates | Feb 5, 2018 | Issued |
Array
(
[id] => 14658293
[patent_doc_number] => 20190236275
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-01
[patent_title] => JUST IN TIME MEMORY ANALYSIS FOR MALWARE DETECTION
[patent_app_type] => utility
[patent_app_number] => 15/890192
[patent_app_country] => US
[patent_app_date] => 2018-02-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10492
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15890192
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/890192 | Just in time memory analysis for malware detection | Feb 5, 2018 | Issued |
Array
(
[id] => 13319119
[patent_doc_number] => 20180211097
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-26
[patent_title] => METHOD AND DEVICE FOR ACQUIRING FEATURE IMAGE, AND USER AUTHENTICATION METHOD
[patent_app_type] => utility
[patent_app_number] => 15/880006
[patent_app_country] => US
[patent_app_date] => 2018-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8612
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15880006
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/880006 | METHOD AND DEVICE FOR ACQUIRING FEATURE IMAGE, AND USER AUTHENTICATION METHOD | Jan 24, 2018 | Abandoned |
Array
(
[id] => 13333249
[patent_doc_number] => 20180218162
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-02
[patent_title] => METHOD AND SYSTEM FOR REACTIVE MINING OF COMPUTER SCREENS
[patent_app_type] => utility
[patent_app_number] => 15/879470
[patent_app_country] => US
[patent_app_date] => 2018-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9000
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15879470
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/879470 | Method and system for reactive mining of computer screens | Jan 24, 2018 | Issued |
Array
(
[id] => 13319155
[patent_doc_number] => 20180211115
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-26
[patent_title] => Total Property Intelligence System
[patent_app_type] => utility
[patent_app_number] => 15/879798
[patent_app_country] => US
[patent_app_date] => 2018-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8739
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15879798
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/879798 | Total property intelligence system | Jan 24, 2018 | Issued |
Array
(
[id] => 16371442
[patent_doc_number] => 10803204
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-13
[patent_title] => Systems and methods for defining and securely sharing objects in preventing data breach or exfiltration
[patent_app_type] => utility
[patent_app_number] => 15/879588
[patent_app_country] => US
[patent_app_date] => 2018-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 23187
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 252
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15879588
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/879588 | Systems and methods for defining and securely sharing objects in preventing data breach or exfiltration | Jan 24, 2018 | Issued |
Array
(
[id] => 14560563
[patent_doc_number] => 10348759
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-09
[patent_title] => Threat detection and mitigation through run-time introspection and instrumentation
[patent_app_type] => utility
[patent_app_number] => 15/874771
[patent_app_country] => US
[patent_app_date] => 2018-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 17183
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15874771
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/874771 | Threat detection and mitigation through run-time introspection and instrumentation | Jan 17, 2018 | Issued |
Array
(
[id] => 17264244
[patent_doc_number] => 20210377229
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-12-02
[patent_title] => INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, AND RECORDING MEDIUM
[patent_app_type] => utility
[patent_app_number] => 16/958661
[patent_app_country] => US
[patent_app_date] => 2017-12-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7132
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16958661
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/958661 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, AND RECORDING MEDIUM | Dec 27, 2017 | Abandoned |
Array
(
[id] => 12653151
[patent_doc_number] => 20180109548
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-19
[patent_title] => DATA PROTECTION IN A NETWORKED COMPUTING ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 15/842952
[patent_app_country] => US
[patent_app_date] => 2017-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8615
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15842952
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/842952 | Data protection in a networked computing environment | Dec 14, 2017 | Issued |
Array
(
[id] => 12653148
[patent_doc_number] => 20180109547
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-04-19
[patent_title] => DATA PROTECTION IN A NETWORKED COMPUTING ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 15/842131
[patent_app_country] => US
[patent_app_date] => 2017-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8615
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -14
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15842131
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/842131 | Data protection in a networked computing environment | Dec 13, 2017 | Issued |
Array
(
[id] => 13757045
[patent_doc_number] => 10171485
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-01
[patent_title] => System conversion in a networked computing environment
[patent_app_type] => utility
[patent_app_number] => 15/840460
[patent_app_country] => US
[patent_app_date] => 2017-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9933
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15840460
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/840460 | System conversion in a networked computing environment | Dec 12, 2017 | Issued |
Array
(
[id] => 12264793
[patent_doc_number] => 20180083989
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-22
[patent_title] => 'MANAGING SECURITY BREACHES IN A NETWORKED COMPUTING ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 15/827003
[patent_app_country] => US
[patent_app_date] => 2017-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8622
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15827003
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/827003 | Managing security breaches in a networked computing environment | Nov 29, 2017 | Issued |
Array
(
[id] => 15477007
[patent_doc_number] => 10554400
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-04
[patent_title] => Method and a system for generating a multi-factor authentication code
[patent_app_type] => utility
[patent_app_number] => 15/824154
[patent_app_country] => US
[patent_app_date] => 2017-11-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 10
[patent_no_of_words] => 7329
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 270
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15824154
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/824154 | Method and a system for generating a multi-factor authentication code | Nov 27, 2017 | Issued |
Array
(
[id] => 14380033
[patent_doc_number] => 20190163929
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-30
[patent_title] => MULTI-PERSONA ENROLLMENT MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 15/824167
[patent_app_country] => US
[patent_app_date] => 2017-11-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7272
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15824167
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/824167 | Multi-persona enrollment management | Nov 27, 2017 | Issued |
Array
(
[id] => 15705673
[patent_doc_number] => 10609031
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-31
[patent_title] => Private consolidated cloud service architecture
[patent_app_type] => utility
[patent_app_number] => 15/824248
[patent_app_country] => US
[patent_app_date] => 2017-11-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 17268
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15824248
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/824248 | Private consolidated cloud service architecture | Nov 27, 2017 | Issued |