
Bryan R. Fischmann
Examiner (ID: 979)
| Most Active Art Unit | 3618 |
| Art Unit(s) | 3611, 3618 |
| Total Applications | 547 |
| Issued Applications | 419 |
| Pending Applications | 17 |
| Abandoned Applications | 111 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13113253
[patent_doc_number] => 10075295
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-11
[patent_title] => Probabilistic key rotation
[patent_app_type] => utility
[patent_app_number] => 15/060487
[patent_app_country] => US
[patent_app_date] => 2016-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13646
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15060487
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/060487 | Probabilistic key rotation | Mar 2, 2016 | Issued |
Array
(
[id] => 11245763
[patent_doc_number] => 09471806
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-10-18
[patent_title] => 'Protection of state data in computer system code'
[patent_app_type] => utility
[patent_app_number] => 15/055928
[patent_app_country] => US
[patent_app_date] => 2016-02-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5426
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15055928
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/055928 | Protection of state data in computer system code | Feb 28, 2016 | Issued |
Array
(
[id] => 14127425
[patent_doc_number] => 10250591
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-02
[patent_title] => Password-based authentication
[patent_app_type] => utility
[patent_app_number] => 15/042241
[patent_app_country] => US
[patent_app_date] => 2016-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 6369
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15042241
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/042241 | Password-based authentication | Feb 11, 2016 | Issued |
Array
(
[id] => 11052247
[patent_doc_number] => 20160249208
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-25
[patent_title] => 'METHODS AND APPARATUSES FOR NAN DATA LINK GROUP FORMATION AND DATA FRAME ADDRESS SETTINGS'
[patent_app_type] => utility
[patent_app_number] => 15/043407
[patent_app_country] => US
[patent_app_date] => 2016-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8182
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15043407
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/043407 | Methods and apparatuses for NAN data link group formation and data frame address settings | Feb 11, 2016 | Issued |
Array
(
[id] => 13978683
[patent_doc_number] => 10218717
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-02-26
[patent_title] => System and method for detecting a malicious activity in a computing environment
[patent_app_type] => utility
[patent_app_number] => 15/042135
[patent_app_country] => US
[patent_app_date] => 2016-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 7577
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15042135
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/042135 | System and method for detecting a malicious activity in a computing environment | Feb 10, 2016 | Issued |
Array
(
[id] => 14065933
[patent_doc_number] => 10237287
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-03-19
[patent_title] => System and method for detecting a malicious activity in a computing environment
[patent_app_type] => utility
[patent_app_number] => 15/042127
[patent_app_country] => US
[patent_app_date] => 2016-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6157
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15042127
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/042127 | System and method for detecting a malicious activity in a computing environment | Feb 10, 2016 | Issued |
Array
(
[id] => 11044579
[patent_doc_number] => 20160241536
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-18
[patent_title] => 'SYSTEM AND METHODS FOR USER AUTHENTICATION ACROSS MULTIPLE DOMAINS'
[patent_app_type] => utility
[patent_app_number] => 15/042104
[patent_app_country] => US
[patent_app_date] => 2016-02-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4118
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15042104
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/042104 | SYSTEM AND METHODS FOR USER AUTHENTICATION ACROSS MULTIPLE DOMAINS | Feb 10, 2016 | Abandoned |
Array
(
[id] => 11119399
[patent_doc_number] => 20160316373
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-10-27
[patent_title] => 'TECHNIQUES FOR MANAGING SECURITY MODE COMMAND (SMC) INTEGRITY FAILURES AT A USER EQUIPMENT (UE)'
[patent_app_type] => utility
[patent_app_number] => 14/997414
[patent_app_country] => US
[patent_app_date] => 2016-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 10739
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14997414
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/997414 | TECHNIQUES FOR MANAGING SECURITY MODE COMMAND (SMC) INTEGRITY FAILURES AT A USER EQUIPMENT (UE) | Jan 14, 2016 | Abandoned |
Array
(
[id] => 12089843
[patent_doc_number] => 09843585
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-12-12
[patent_title] => 'Methods and apparatus for large scale distribution of electronic access clients'
[patent_app_type] => utility
[patent_app_number] => 14/995154
[patent_app_country] => US
[patent_app_date] => 2016-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 10618
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14995154
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/995154 | Methods and apparatus for large scale distribution of electronic access clients | Jan 12, 2016 | Issued |
Array
(
[id] => 12013763
[patent_doc_number] => 09807096
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-31
[patent_title] => 'Controlled token distribution to protect against malicious data and resource access'
[patent_app_type] => utility
[patent_app_number] => 14/973205
[patent_app_country] => US
[patent_app_date] => 2015-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 24302
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 279
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14973205
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/973205 | Controlled token distribution to protect against malicious data and resource access | Dec 16, 2015 | Issued |
Array
(
[id] => 11179966
[patent_doc_number] => 09411960
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-09
[patent_title] => 'Virus co-processor instructions and methods for using such'
[patent_app_type] => utility
[patent_app_number] => 14/968655
[patent_app_country] => US
[patent_app_date] => 2015-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 11937
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14968655
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/968655 | Virus co-processor instructions and methods for using such | Dec 13, 2015 | Issued |
Array
(
[id] => 10746222
[patent_doc_number] => 20160092374
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-31
[patent_title] => 'CHUNK-LEVEL CLIENT SIDE ENCRYPTION IN HIERARCHICAL CONTENT ADDRESSABLE STORAGE SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/962816
[patent_app_country] => US
[patent_app_date] => 2015-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10813
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14962816
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/962816 | Chunk-level client side encryption in hierarchical content addressable storage systems | Dec 7, 2015 | Issued |
Array
(
[id] => 11674892
[patent_doc_number] => 20170163616
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-08
[patent_title] => 'SYSTEM, APPARATUS AND METHOD FOR PROVIDING PRIVACY PRESERVING INTERACTION WITH A COMPUTING SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/961006
[patent_app_country] => US
[patent_app_date] => 2015-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8653
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14961006
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/961006 | System, apparatus and method for providing privacy preserving interaction with a computing system | Dec 6, 2015 | Issued |
Array
(
[id] => 10739827
[patent_doc_number] => 20160085978
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'SYSTEM AND METHOD FOR MANAGING COLLABORATION IN A NETWORKED SECURE EXCHANGE ENVIRONMENT'
[patent_app_type] => utility
[patent_app_number] => 14/961305
[patent_app_country] => US
[patent_app_date] => 2015-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 93
[patent_figures_cnt] => 93
[patent_no_of_words] => 34009
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14961305
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/961305 | System and method for managing collaboration in a networked secure exchange environment | Dec 6, 2015 | Issued |
Array
(
[id] => 11579764
[patent_doc_number] => 09635038
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-25
[patent_title] => 'Signed response to an abusive email account owner and provider systems and methods'
[patent_app_type] => utility
[patent_app_number] => 14/942851
[patent_app_country] => US
[patent_app_date] => 2015-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5119
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14942851
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/942851 | Signed response to an abusive email account owner and provider systems and methods | Nov 15, 2015 | Issued |
Array
(
[id] => 11220850
[patent_doc_number] => 09449189
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-09-20
[patent_title] => 'Protection of state data in computer system code'
[patent_app_type] => utility
[patent_app_number] => 14/930687
[patent_app_country] => US
[patent_app_date] => 2015-11-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5426
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14930687
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/930687 | Protection of state data in computer system code | Nov 2, 2015 | Issued |
Array
(
[id] => 11998287
[patent_doc_number] => 20170302442
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'DEVICE, METHOD AND PROGRAM FOR DETECTING POSITIONS OF PARTIAL CHARACTER STRINGS'
[patent_app_type] => utility
[patent_app_number] => 15/515650
[patent_app_country] => US
[patent_app_date] => 2015-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4227
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15515650
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/515650 | Device, method and program for detecting positions of partial character strings | Oct 4, 2015 | Issued |
Array
(
[id] => 12014100
[patent_doc_number] => 09807437
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-31
[patent_title] => 'Method, system, mobile device, apparatus and computer program product for validating rights objects'
[patent_app_type] => utility
[patent_app_number] => 14/868127
[patent_app_country] => US
[patent_app_date] => 2015-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6460
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14868127
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/868127 | Method, system, mobile device, apparatus and computer program product for validating rights objects | Sep 27, 2015 | Issued |
Array
(
[id] => 10726623
[patent_doc_number] => 20160072772
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-10
[patent_title] => 'Process for Secure Document Exchange'
[patent_app_type] => utility
[patent_app_number] => 14/848209
[patent_app_country] => US
[patent_app_date] => 2015-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 4673
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14848209
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/848209 | Process for Secure Document Exchange | Sep 7, 2015 | Abandoned |
Array
(
[id] => 14860955
[patent_doc_number] => 10419223
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-17
[patent_title] => Method of using symmetric cryptography for both data encryption and sign-on authentication
[patent_app_type] => utility
[patent_app_number] => 14/841296
[patent_app_country] => US
[patent_app_date] => 2015-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5401
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841296
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/841296 | Method of using symmetric cryptography for both data encryption and sign-on authentication | Aug 30, 2015 | Issued |