Search

Bryan R. Fischmann

Examiner (ID: 979)

Most Active Art Unit
3618
Art Unit(s)
3611, 3618
Total Applications
547
Issued Applications
419
Pending Applications
17
Abandoned Applications
111

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 6061338 [patent_doc_number] => 20110200193 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-08-18 [patent_title] => 'METHOD AND APPARATUS FOR CONTROLLING THE RECHARGING OF ELECTRIC VEHICLES AND DETECTING STOLEN VEHICLES AND VEHICULAR COMPONENTS' [patent_app_type] => utility [patent_app_number] => 12/780835 [patent_app_country] => US [patent_app_date] => 2010-05-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 24 [patent_figures_cnt] => 24 [patent_no_of_words] => 21922 [patent_no_of_claims] => 33 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0200/20110200193.pdf [firstpage_image] =>[orig_patent_app_number] => 12780835 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/780835
METHOD AND APPARATUS FOR CONTROLLING THE RECHARGING OF ELECTRIC VEHICLES AND DETECTING STOLEN VEHICLES AND VEHICULAR COMPONENTS May 13, 2010 Abandoned
Array ( [id] => 6204067 [patent_doc_number] => 20110066853 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-17 [patent_title] => 'SYSTEM AND METHOD FOR SECURELY IDENTIFYING AND AUTHENTICATING DEVICES IN A SYMMETRIC ENCRYPTION SYSTEM' [patent_app_type] => utility [patent_app_number] => 12/779496 [patent_app_country] => US [patent_app_date] => 2010-05-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 6503 [patent_no_of_claims] => 34 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0066/20110066853.pdf [firstpage_image] =>[orig_patent_app_number] => 12779496 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/779496
SYSTEM AND METHOD FOR SECURELY IDENTIFYING AND AUTHENTICATING DEVICES IN A SYMMETRIC ENCRYPTION SYSTEM May 12, 2010 Abandoned
Array ( [id] => 6566984 [patent_doc_number] => 20100223657 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-09-02 [patent_title] => 'METHOD AND SYSTEM FOR INCLUDING NETWORK SECURITY INFORMATION IN A FRAME' [patent_app_type] => utility [patent_app_number] => 12/779212 [patent_app_country] => US [patent_app_date] => 2010-05-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6494 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0223/20100223657.pdf [firstpage_image] =>[orig_patent_app_number] => 12779212 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/779212
Method and system for including network security information in a frame May 12, 2010 Issued
Array ( [id] => 8983952 [patent_doc_number] => 08515077 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-08-20 [patent_title] => 'Automatic application management in a short-range wireless system' [patent_app_type] => utility [patent_app_number] => 12/778661 [patent_app_country] => US [patent_app_date] => 2010-05-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4238 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12778661 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/778661
Automatic application management in a short-range wireless system May 11, 2010 Issued
Array ( [id] => 7562968 [patent_doc_number] => 20110276802 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-11-10 [patent_title] => 'METHODS AND APPARATUS FOR PEER-TO-PEER TRANSFER OF SECURE DATA USING NEAR FIELD COMMUNICATIONS' [patent_app_type] => utility [patent_app_number] => 12/776510 [patent_app_country] => US [patent_app_date] => 2010-05-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5492 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0276/20110276802.pdf [firstpage_image] =>[orig_patent_app_number] => 12776510 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/776510
Methods and apparatus for peer-to-peer transfer of secure data using near field communications May 9, 2010 Issued
Array ( [id] => 8985412 [patent_doc_number] => 08516541 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-08-20 [patent_title] => 'Method, system, and computer program product for network authorization' [patent_app_type] => utility [patent_app_number] => 12/775404 [patent_app_country] => US [patent_app_date] => 2010-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 24 [patent_figures_cnt] => 24 [patent_no_of_words] => 11799 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 331 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12775404 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/775404
Method, system, and computer program product for network authorization May 5, 2010 Issued
Array ( [id] => 6465632 [patent_doc_number] => 20100281515 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-11-04 [patent_title] => 'METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR FACILITATING COMMUNICATION IN AN INTEROPERABILITY NETWORK' [patent_app_type] => utility [patent_app_number] => 12/775394 [patent_app_country] => US [patent_app_date] => 2010-05-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 25 [patent_figures_cnt] => 25 [patent_no_of_words] => 11766 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0281/20100281515.pdf [firstpage_image] =>[orig_patent_app_number] => 12775394 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/775394
Method, system, and computer program product for facilitating communication in an interoperability network May 5, 2010 Issued
Array ( [id] => 9103050 [patent_doc_number] => 08566944 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-10-22 [patent_title] => 'Malware investigation by analyzing computer memory' [patent_app_type] => utility [patent_app_number] => 12/767810 [patent_app_country] => US [patent_app_date] => 2010-04-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 8026 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 211 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12767810 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/767810
Malware investigation by analyzing computer memory Apr 26, 2010 Issued
Array ( [id] => 9256552 [patent_doc_number] => 08619985 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-12-31 [patent_title] => 'Table splitting for cryptographic processes' [patent_app_type] => utility [patent_app_number] => 12/768160 [patent_app_country] => US [patent_app_date] => 2010-04-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7866 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 176 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12768160 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/768160
Table splitting for cryptographic processes Apr 26, 2010 Issued
Array ( [id] => 8985134 [patent_doc_number] => 08516264 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-08-20 [patent_title] => 'Interlocking plain text passwords to data encryption keys' [patent_app_type] => utility [patent_app_number] => 12/768058 [patent_app_country] => US [patent_app_date] => 2010-04-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 10282 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 384 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12768058 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/768058
Interlocking plain text passwords to data encryption keys Apr 26, 2010 Issued
Array ( [id] => 6597479 [patent_doc_number] => 20100275263 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-10-28 [patent_title] => 'Enterprise Information Security Management Software For Prediction Modeling With Interactive Graphs' [patent_app_type] => utility [patent_app_number] => 12/767799 [patent_app_country] => US [patent_app_date] => 2010-04-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 16880 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0275/20100275263.pdf [firstpage_image] =>[orig_patent_app_number] => 12767799 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/767799
Enterprise information security management software for prediction modeling with interactive graphs Apr 25, 2010 Issued
Array ( [id] => 7503835 [patent_doc_number] => 20110264925 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-10-27 [patent_title] => 'SECURING DATA ON A SELF-ENCRYPTING STORAGE DEVICE' [patent_app_type] => utility [patent_app_number] => 12/766223 [patent_app_country] => US [patent_app_date] => 2010-04-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3044 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0264/20110264925.pdf [firstpage_image] =>[orig_patent_app_number] => 12766223 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/766223
SECURING DATA ON A SELF-ENCRYPTING STORAGE DEVICE Apr 22, 2010 Abandoned
Array ( [id] => 6100754 [patent_doc_number] => 20110004916 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-06 [patent_title] => 'SECURELY USING SERVICE PROVIDERS IN ELASTIC COMPUTING SYSTEMS AND ENVIRONMENTS' [patent_app_type] => utility [patent_app_number] => 12/765775 [patent_app_country] => US [patent_app_date] => 2010-04-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 13257 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0004/20110004916.pdf [firstpage_image] =>[orig_patent_app_number] => 12765775 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/765775
Securely using service providers in elastic computing systems and environments Apr 21, 2010 Issued
Array ( [id] => 8162633 [patent_doc_number] => 20120102330 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-04-26 [patent_title] => 'METHOD FOR PROTECTING A TELECOMMUNICATION NETWORK AND SECURE ROUTER IMPLEMENTING SUCH A METHOD' [patent_app_type] => utility [patent_app_number] => 13/375127 [patent_app_country] => US [patent_app_date] => 2010-04-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 2101 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0102/20120102330.pdf [firstpage_image] =>[orig_patent_app_number] => 13375127 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/375127
Method for protecting a telecommunication network and secure router implementing such a method Apr 21, 2010 Issued
Array ( [id] => 8655659 [patent_doc_number] => 08375427 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-02-12 [patent_title] => 'Holistic risk-based identity establishment for eligibility determinations in context of an application' [patent_app_type] => utility [patent_app_number] => 12/764570 [patent_app_country] => US [patent_app_date] => 2010-04-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 8619 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 462 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12764570 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/764570
Holistic risk-based identity establishment for eligibility determinations in context of an application Apr 20, 2010 Issued
Array ( [id] => 7503797 [patent_doc_number] => 20110264905 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-10-27 [patent_title] => 'SYSTEMS AND METHODS FOR SPLIT PROXYING OF SSL VIA WAN APPLIANCES' [patent_app_type] => utility [patent_app_number] => 12/764633 [patent_app_country] => US [patent_app_date] => 2010-04-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 46953 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0264/20110264905.pdf [firstpage_image] =>[orig_patent_app_number] => 12764633 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/764633
Systems and methods for split proxying of SSL via WAN appliances Apr 20, 2010 Issued
Array ( [id] => 9707719 [patent_doc_number] => 08832815 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-09-09 [patent_title] => 'Accessory based data distribution' [patent_app_type] => utility [patent_app_number] => 12/764376 [patent_app_country] => US [patent_app_date] => 2010-04-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 9087 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 119 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12764376 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/764376
Accessory based data distribution Apr 20, 2010 Issued
Array ( [id] => 7775527 [patent_doc_number] => 20120039471 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-02-16 [patent_title] => 'EFFICIENT SECURITY-RELATED PROCESSING' [patent_app_type] => utility [patent_app_number] => 13/265782 [patent_app_country] => US [patent_app_date] => 2010-04-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 11351 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0039/20120039471.pdf [firstpage_image] =>[orig_patent_app_number] => 13265782 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/265782
Efficient security-related processing Apr 18, 2010 Issued
Array ( [id] => 6031640 [patent_doc_number] => 20110055578 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-03 [patent_title] => 'VERIFICATION OF DISPERSED STORAGE NETWORK ACCESS CONTROL INFORMATION' [patent_app_type] => utility [patent_app_number] => 12/759701 [patent_app_country] => US [patent_app_date] => 2010-04-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 19449 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0055/20110055578.pdf [firstpage_image] =>[orig_patent_app_number] => 12759701 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/759701
Verification of dispersed storage network access control information Apr 13, 2010 Issued
Array ( [id] => 9695784 [patent_doc_number] => 08826414 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-09-02 [patent_title] => 'System-on-chip malicious code detection apparatus and application-specific integrated circuit for a mobile device' [patent_app_type] => utility [patent_app_number] => 13/263915 [patent_app_country] => US [patent_app_date] => 2010-03-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2481 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 309 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13263915 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/263915
System-on-chip malicious code detection apparatus and application-specific integrated circuit for a mobile device Mar 25, 2010 Issued
Menu