
Bryan R. Fischmann
Examiner (ID: 979)
| Most Active Art Unit | 3618 |
| Art Unit(s) | 3611, 3618 |
| Total Applications | 547 |
| Issued Applications | 419 |
| Pending Applications | 17 |
| Abandoned Applications | 111 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13820837
[patent_doc_number] => 10187207
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-22
[patent_title] => Re-encryption key generator, re-encryption apparatus, encryption apparatus, decryption apparatus, and storage medium
[patent_app_type] => utility
[patent_app_number] => 15/261584
[patent_app_country] => US
[patent_app_date] => 2016-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 22352
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 231
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15261584
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/261584 | Re-encryption key generator, re-encryption apparatus, encryption apparatus, decryption apparatus, and storage medium | Sep 8, 2016 | Issued |
Array
(
[id] => 11354740
[patent_doc_number] => 20160373481
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'THREAT DETECTION AND MITIGATION THROUGH RUN-TIME INTROSPECTION AND INSTRUMENTATION'
[patent_app_type] => utility
[patent_app_number] => 15/256381
[patent_app_country] => US
[patent_app_date] => 2016-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 17731
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15256381
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/256381 | Threat detection and mitigation through run-time introspection and instrumentation | Sep 1, 2016 | Issued |
Array
(
[id] => 11354729
[patent_doc_number] => 20160373470
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'MANAGING SECURITY BREACHES IN A NETWORKED COMPUTING ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 15/251023
[patent_app_country] => US
[patent_app_date] => 2016-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8622
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15251023
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/251023 | Managing security breaches in a networked computing environment | Aug 29, 2016 | Issued |
Array
(
[id] => 11504070
[patent_doc_number] => 20170078255
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-16
[patent_title] => 'SYSTEMS AND METHODS FOR IMPLEMENTING MODULAR DIGITAL ENCRYPTION KEY MANAGEMENT SOLUTIONS'
[patent_app_type] => utility
[patent_app_number] => 15/244753
[patent_app_country] => US
[patent_app_date] => 2016-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11375
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15244753
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/244753 | SYSTEMS AND METHODS FOR IMPLEMENTING MODULAR DIGITAL ENCRYPTION KEY MANAGEMENT SOLUTIONS | Aug 22, 2016 | Abandoned |
Array
(
[id] => 12359469
[patent_doc_number] => 09955349
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-04-24
[patent_title] => Triggering a request for an authentication
[patent_app_type] => utility
[patent_app_number] => 15/242277
[patent_app_country] => US
[patent_app_date] => 2016-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12412
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15242277
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/242277 | Triggering a request for an authentication | Aug 18, 2016 | Issued |
Array
(
[id] => 11861195
[patent_doc_number] => 09740878
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-22
[patent_title] => 'Protection of state data in computer system code'
[patent_app_type] => utility
[patent_app_number] => 15/237765
[patent_app_country] => US
[patent_app_date] => 2016-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5426
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15237765
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/237765 | Protection of state data in computer system code | Aug 15, 2016 | Issued |
Array
(
[id] => 11447046
[patent_doc_number] => 20170048068
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'Secure Password Management Systems, Methods and Apparatuses'
[patent_app_type] => utility
[patent_app_number] => 15/205708
[patent_app_country] => US
[patent_app_date] => 2016-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7318
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15205708
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/205708 | Secure password management systems, methods and apparatuses | Jul 7, 2016 | Issued |
Array
(
[id] => 11368178
[patent_doc_number] => 20170006160
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'INFORMATION SHARING CONTROL'
[patent_app_type] => utility
[patent_app_number] => 15/201214
[patent_app_country] => US
[patent_app_date] => 2016-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 37
[patent_figures_cnt] => 37
[patent_no_of_words] => 11805
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15201214
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/201214 | INFORMATION SHARING CONTROL | Jun 30, 2016 | Abandoned |
Array
(
[id] => 13911021
[patent_doc_number] => 20190044715
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-07
[patent_title] => SECURE PROGRAMMING OF SECRET DATA
[patent_app_type] => utility
[patent_app_number] => 16/075109
[patent_app_country] => US
[patent_app_date] => 2016-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3380
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16075109
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/075109 | Secure programming of secret data | Jun 28, 2016 | Issued |
Array
(
[id] => 11103093
[patent_doc_number] => 20160300062
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-13
[patent_title] => 'VIRUS CO-PROCESSOR INSTRUCTIONS AND METHODS FOR USING SUCH'
[patent_app_type] => utility
[patent_app_number] => 15/190413
[patent_app_country] => US
[patent_app_date] => 2016-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 11945
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15190413
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/190413 | Virus co-processor instructions and methods for using such | Jun 22, 2016 | Issued |
Array
(
[id] => 11104700
[patent_doc_number] => 20160301670
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-13
[patent_title] => 'System and Method for Signaling Segment Encryption and Key Derivation for Adaptive Streaming'
[patent_app_type] => utility
[patent_app_number] => 15/183369
[patent_app_country] => US
[patent_app_date] => 2016-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7678
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15183369
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/183369 | System and method for signaling segment encryption and key derivation for adaptive streaming | Jun 14, 2016 | Issued |
Array
(
[id] => 11097818
[patent_doc_number] => 20160294788
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-06
[patent_title] => 'Bin enabled data object encryption and storage apparatuses, methods and systems'
[patent_app_type] => utility
[patent_app_number] => 15/180036
[patent_app_country] => US
[patent_app_date] => 2016-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 22649
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15180036
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/180036 | Bin enabled data object encryption and storage apparatuses, methods and systems | Jun 11, 2016 | Issued |
Array
(
[id] => 11616579
[patent_doc_number] => 09654450
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-16
[patent_title] => 'Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys'
[patent_app_type] => utility
[patent_app_number] => 15/179650
[patent_app_country] => US
[patent_app_date] => 2016-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 86
[patent_figures_cnt] => 86
[patent_no_of_words] => 27265
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15179650
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/179650 | Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys | Jun 9, 2016 | Issued |
Array
(
[id] => 11058109
[patent_doc_number] => 20160255071
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-01
[patent_title] => 'COMPUTERIZED METHOD AND SYSTEM FOR MANAGING AN EMAIL INPUT FACILITY IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 15/152481
[patent_app_country] => US
[patent_app_date] => 2016-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 85
[patent_figures_cnt] => 85
[patent_no_of_words] => 20847
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15152481
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/152481 | Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment | May 10, 2016 | Issued |
Array
(
[id] => 11354684
[patent_doc_number] => 20160373425
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-22
[patent_title] => 'COMPUTERIZED METHOD AND SYSTEM FOR MANAGING A COMMUNITY FACILITY IN A NETWORKED SECURE COLLABORATIVE EXCHANGE ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 15/152457
[patent_app_country] => US
[patent_app_date] => 2016-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 85
[patent_figures_cnt] => 85
[patent_no_of_words] => 20846
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15152457
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/152457 | Computerized method and system for managing a community facility in a networked secure collaborative exchange environment | May 10, 2016 | Issued |
Array
(
[id] => 11037059
[patent_doc_number] => 20160234016
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'POWER LINE BASED THEFT PROTECTION OF ELECTRONIC DEVICES'
[patent_app_type] => utility
[patent_app_number] => 15/132494
[patent_app_country] => US
[patent_app_date] => 2016-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7878
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15132494
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/132494 | Power line based theft protection of electronic devices | Apr 18, 2016 | Issued |
Array
(
[id] => 11540438
[patent_doc_number] => 09614867
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-04
[patent_title] => 'System and method for detection of malware on a user device using corrected antivirus records'
[patent_app_type] => utility
[patent_app_number] => 15/098896
[patent_app_country] => US
[patent_app_date] => 2016-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8318
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15098896
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/098896 | System and method for detection of malware on a user device using corrected antivirus records | Apr 13, 2016 | Issued |
Array
(
[id] => 11008599
[patent_doc_number] => 20160205552
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-14
[patent_title] => 'Authentication Via Motion of Wireless Device Movement'
[patent_app_type] => utility
[patent_app_number] => 15/076616
[patent_app_country] => US
[patent_app_date] => 2016-03-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2498
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15076616
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/076616 | Authentication Via Motion of Wireless Device Movement | Mar 20, 2016 | Abandoned |
Array
(
[id] => 13133619
[patent_doc_number] => 10084760
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-25
[patent_title] => Secure messages for internet of things devices
[patent_app_type] => utility
[patent_app_number] => 15/068112
[patent_app_country] => US
[patent_app_date] => 2016-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4531
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15068112
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/068112 | Secure messages for internet of things devices | Mar 10, 2016 | Issued |
Array
(
[id] => 11368010
[patent_doc_number] => 20170005992
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-01-05
[patent_title] => 'SECURE MESSAGE TRANSMISSION USING DYNAMIC SEGMENTATION AND ENCRYPTION'
[patent_app_type] => utility
[patent_app_number] => 15/065606
[patent_app_country] => US
[patent_app_date] => 2016-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3315
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15065606
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/065606 | SECURE MESSAGE TRANSMISSION USING DYNAMIC SEGMENTATION AND ENCRYPTION | Mar 8, 2016 | Abandoned |