
Bryan R. Fischmann
Examiner (ID: 979)
| Most Active Art Unit | 3618 |
| Art Unit(s) | 3611, 3618 |
| Total Applications | 547 |
| Issued Applications | 419 |
| Pending Applications | 17 |
| Abandoned Applications | 111 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 6061338
[patent_doc_number] => 20110200193
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-08-18
[patent_title] => 'METHOD AND APPARATUS FOR CONTROLLING THE RECHARGING OF ELECTRIC VEHICLES AND DETECTING STOLEN VEHICLES AND VEHICULAR COMPONENTS'
[patent_app_type] => utility
[patent_app_number] => 12/780835
[patent_app_country] => US
[patent_app_date] => 2010-05-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 21922
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0200/20110200193.pdf
[firstpage_image] =>[orig_patent_app_number] => 12780835
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/780835 | METHOD AND APPARATUS FOR CONTROLLING THE RECHARGING OF ELECTRIC VEHICLES AND DETECTING STOLEN VEHICLES AND VEHICULAR COMPONENTS | May 13, 2010 | Abandoned |
Array
(
[id] => 6204067
[patent_doc_number] => 20110066853
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-17
[patent_title] => 'SYSTEM AND METHOD FOR SECURELY IDENTIFYING AND AUTHENTICATING DEVICES IN A SYMMETRIC ENCRYPTION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 12/779496
[patent_app_country] => US
[patent_app_date] => 2010-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 6503
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0066/20110066853.pdf
[firstpage_image] =>[orig_patent_app_number] => 12779496
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/779496 | SYSTEM AND METHOD FOR SECURELY IDENTIFYING AND AUTHENTICATING DEVICES IN A SYMMETRIC ENCRYPTION SYSTEM | May 12, 2010 | Abandoned |
Array
(
[id] => 6566984
[patent_doc_number] => 20100223657
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-02
[patent_title] => 'METHOD AND SYSTEM FOR INCLUDING NETWORK SECURITY INFORMATION IN A FRAME'
[patent_app_type] => utility
[patent_app_number] => 12/779212
[patent_app_country] => US
[patent_app_date] => 2010-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6494
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0223/20100223657.pdf
[firstpage_image] =>[orig_patent_app_number] => 12779212
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/779212 | Method and system for including network security information in a frame | May 12, 2010 | Issued |
Array
(
[id] => 8983952
[patent_doc_number] => 08515077
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-20
[patent_title] => 'Automatic application management in a short-range wireless system'
[patent_app_type] => utility
[patent_app_number] => 12/778661
[patent_app_country] => US
[patent_app_date] => 2010-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4238
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12778661
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/778661 | Automatic application management in a short-range wireless system | May 11, 2010 | Issued |
Array
(
[id] => 7562968
[patent_doc_number] => 20110276802
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-10
[patent_title] => 'METHODS AND APPARATUS FOR PEER-TO-PEER TRANSFER OF SECURE DATA USING NEAR FIELD COMMUNICATIONS'
[patent_app_type] => utility
[patent_app_number] => 12/776510
[patent_app_country] => US
[patent_app_date] => 2010-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5492
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0276/20110276802.pdf
[firstpage_image] =>[orig_patent_app_number] => 12776510
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/776510 | Methods and apparatus for peer-to-peer transfer of secure data using near field communications | May 9, 2010 | Issued |
Array
(
[id] => 8985412
[patent_doc_number] => 08516541
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-20
[patent_title] => 'Method, system, and computer program product for network authorization'
[patent_app_type] => utility
[patent_app_number] => 12/775404
[patent_app_country] => US
[patent_app_date] => 2010-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 11799
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 331
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12775404
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/775404 | Method, system, and computer program product for network authorization | May 5, 2010 | Issued |
Array
(
[id] => 6465632
[patent_doc_number] => 20100281515
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-11-04
[patent_title] => 'METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR FACILITATING COMMUNICATION IN AN INTEROPERABILITY NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/775394
[patent_app_country] => US
[patent_app_date] => 2010-05-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 11766
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0281/20100281515.pdf
[firstpage_image] =>[orig_patent_app_number] => 12775394
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/775394 | Method, system, and computer program product for facilitating communication in an interoperability network | May 5, 2010 | Issued |
Array
(
[id] => 9103050
[patent_doc_number] => 08566944
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-10-22
[patent_title] => 'Malware investigation by analyzing computer memory'
[patent_app_type] => utility
[patent_app_number] => 12/767810
[patent_app_country] => US
[patent_app_date] => 2010-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 8026
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 211
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12767810
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/767810 | Malware investigation by analyzing computer memory | Apr 26, 2010 | Issued |
Array
(
[id] => 9256552
[patent_doc_number] => 08619985
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-12-31
[patent_title] => 'Table splitting for cryptographic processes'
[patent_app_type] => utility
[patent_app_number] => 12/768160
[patent_app_country] => US
[patent_app_date] => 2010-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7866
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 176
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12768160
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/768160 | Table splitting for cryptographic processes | Apr 26, 2010 | Issued |
Array
(
[id] => 8985134
[patent_doc_number] => 08516264
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-08-20
[patent_title] => 'Interlocking plain text passwords to data encryption keys'
[patent_app_type] => utility
[patent_app_number] => 12/768058
[patent_app_country] => US
[patent_app_date] => 2010-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 10282
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 384
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12768058
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/768058 | Interlocking plain text passwords to data encryption keys | Apr 26, 2010 | Issued |
Array
(
[id] => 6597479
[patent_doc_number] => 20100275263
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-10-28
[patent_title] => 'Enterprise Information Security Management Software For Prediction Modeling With Interactive Graphs'
[patent_app_type] => utility
[patent_app_number] => 12/767799
[patent_app_country] => US
[patent_app_date] => 2010-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 16880
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0275/20100275263.pdf
[firstpage_image] =>[orig_patent_app_number] => 12767799
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/767799 | Enterprise information security management software for prediction modeling with interactive graphs | Apr 25, 2010 | Issued |
Array
(
[id] => 7503835
[patent_doc_number] => 20110264925
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-10-27
[patent_title] => 'SECURING DATA ON A SELF-ENCRYPTING STORAGE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 12/766223
[patent_app_country] => US
[patent_app_date] => 2010-04-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3044
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0264/20110264925.pdf
[firstpage_image] =>[orig_patent_app_number] => 12766223
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/766223 | SECURING DATA ON A SELF-ENCRYPTING STORAGE DEVICE | Apr 22, 2010 | Abandoned |
Array
(
[id] => 6100754
[patent_doc_number] => 20110004916
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-06
[patent_title] => 'SECURELY USING SERVICE PROVIDERS IN ELASTIC COMPUTING SYSTEMS AND ENVIRONMENTS'
[patent_app_type] => utility
[patent_app_number] => 12/765775
[patent_app_country] => US
[patent_app_date] => 2010-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 13257
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0004/20110004916.pdf
[firstpage_image] =>[orig_patent_app_number] => 12765775
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/765775 | Securely using service providers in elastic computing systems and environments | Apr 21, 2010 | Issued |
Array
(
[id] => 8162633
[patent_doc_number] => 20120102330
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-26
[patent_title] => 'METHOD FOR PROTECTING A TELECOMMUNICATION NETWORK AND SECURE ROUTER IMPLEMENTING SUCH A METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/375127
[patent_app_country] => US
[patent_app_date] => 2010-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 2101
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0102/20120102330.pdf
[firstpage_image] =>[orig_patent_app_number] => 13375127
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/375127 | Method for protecting a telecommunication network and secure router implementing such a method | Apr 21, 2010 | Issued |
Array
(
[id] => 8655659
[patent_doc_number] => 08375427
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-02-12
[patent_title] => 'Holistic risk-based identity establishment for eligibility determinations in context of an application'
[patent_app_type] => utility
[patent_app_number] => 12/764570
[patent_app_country] => US
[patent_app_date] => 2010-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8619
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 462
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12764570
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/764570 | Holistic risk-based identity establishment for eligibility determinations in context of an application | Apr 20, 2010 | Issued |
Array
(
[id] => 7503797
[patent_doc_number] => 20110264905
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-10-27
[patent_title] => 'SYSTEMS AND METHODS FOR SPLIT PROXYING OF SSL VIA WAN APPLIANCES'
[patent_app_type] => utility
[patent_app_number] => 12/764633
[patent_app_country] => US
[patent_app_date] => 2010-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 46953
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0264/20110264905.pdf
[firstpage_image] =>[orig_patent_app_number] => 12764633
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/764633 | Systems and methods for split proxying of SSL via WAN appliances | Apr 20, 2010 | Issued |
Array
(
[id] => 9707719
[patent_doc_number] => 08832815
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-09
[patent_title] => 'Accessory based data distribution'
[patent_app_type] => utility
[patent_app_number] => 12/764376
[patent_app_country] => US
[patent_app_date] => 2010-04-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9087
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12764376
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/764376 | Accessory based data distribution | Apr 20, 2010 | Issued |
Array
(
[id] => 7775527
[patent_doc_number] => 20120039471
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-16
[patent_title] => 'EFFICIENT SECURITY-RELATED PROCESSING'
[patent_app_type] => utility
[patent_app_number] => 13/265782
[patent_app_country] => US
[patent_app_date] => 2010-04-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 11351
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0039/20120039471.pdf
[firstpage_image] =>[orig_patent_app_number] => 13265782
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/265782 | Efficient security-related processing | Apr 18, 2010 | Issued |
Array
(
[id] => 6031640
[patent_doc_number] => 20110055578
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-03
[patent_title] => 'VERIFICATION OF DISPERSED STORAGE NETWORK ACCESS CONTROL INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 12/759701
[patent_app_country] => US
[patent_app_date] => 2010-04-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 19449
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0055/20110055578.pdf
[firstpage_image] =>[orig_patent_app_number] => 12759701
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/759701 | Verification of dispersed storage network access control information | Apr 13, 2010 | Issued |
Array
(
[id] => 9695784
[patent_doc_number] => 08826414
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-02
[patent_title] => 'System-on-chip malicious code detection apparatus and application-specific integrated circuit for a mobile device'
[patent_app_type] => utility
[patent_app_number] => 13/263915
[patent_app_country] => US
[patent_app_date] => 2010-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2481
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 309
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13263915
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/263915 | System-on-chip malicious code detection apparatus and application-specific integrated circuit for a mobile device | Mar 25, 2010 | Issued |