Search

Bryan R. Fischmann

Examiner (ID: 979)

Most Active Art Unit
3618
Art Unit(s)
3611, 3618
Total Applications
547
Issued Applications
419
Pending Applications
17
Abandoned Applications
111

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 4510962 [patent_doc_number] => 07949879 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-05-24 [patent_title] => 'Secure password entry' [patent_app_type] => utility [patent_app_number] => 12/427904 [patent_app_country] => US [patent_app_date] => 2009-04-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 6 [patent_no_of_words] => 6504 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 78 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/949/07949879.pdf [firstpage_image] =>[orig_patent_app_number] => 12427904 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/427904
Secure password entry Apr 21, 2009 Issued
Array ( [id] => 6536677 [patent_doc_number] => 20100218255 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-08-26 [patent_title] => 'Procedure for the 100% infection free installation/re-installation, patching and maintenance of a personal computers operating system' [patent_app_type] => utility [patent_app_number] => 12/380253 [patent_app_country] => US [patent_app_date] => 2009-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 1460 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0218/20100218255.pdf [firstpage_image] =>[orig_patent_app_number] => 12380253 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/380253
Procedure for the 100% infection free installation/re-installation, patching and maintenance of a personal computers operating system Feb 23, 2009 Abandoned
Array ( [id] => 6487933 [patent_doc_number] => 20100208888 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-08-19 [patent_title] => 'PASSWORD KEY DERIVATION SYSTEM AND METHOD' [patent_app_type] => utility [patent_app_number] => 12/371370 [patent_app_country] => US [patent_app_date] => 2009-02-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3433 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0208/20100208888.pdf [firstpage_image] =>[orig_patent_app_number] => 12371370 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/371370
Password key derivation system and method Feb 12, 2009 Issued
Array ( [id] => 9142301 [patent_doc_number] => 08582775 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-11-12 [patent_title] => 'Method of securing and authenticating data using micro-certificates' [patent_app_type] => utility [patent_app_number] => 12/370075 [patent_app_country] => US [patent_app_date] => 2009-02-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 6348 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 101 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12370075 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/370075
Method of securing and authenticating data using micro-certificates Feb 11, 2009 Issued
Array ( [id] => 5393383 [patent_doc_number] => 20090210696 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-08-20 [patent_title] => 'Method of bootstrapping an authenticated data session configuration' [patent_app_type] => utility [patent_app_number] => 12/378144 [patent_app_country] => US [patent_app_date] => 2009-02-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 10991 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0210/20090210696.pdf [firstpage_image] =>[orig_patent_app_number] => 12378144 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/378144
Method of bootstrapping an authenticated data session configuration Feb 11, 2009 Issued
Array ( [id] => 6481868 [patent_doc_number] => 20100192196 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-29 [patent_title] => 'HEALTH-BASED ACCESS TO NETWORK RESOURCES' [patent_app_type] => utility [patent_app_number] => 12/361548 [patent_app_country] => US [patent_app_date] => 2009-01-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5092 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0192/20100192196.pdf [firstpage_image] =>[orig_patent_app_number] => 12361548 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/361548
Health-based access to network resources Jan 28, 2009 Issued
Array ( [id] => 6448703 [patent_doc_number] => 20100189264 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-29 [patent_title] => 'METHODS AND APPARATUS RELATED TO ADDRESS GENERATION, COMMUNICATION AND/OR VALIDATION' [patent_app_type] => utility [patent_app_number] => 12/360899 [patent_app_country] => US [patent_app_date] => 2009-01-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 10084 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 8 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0189/20100189264.pdf [firstpage_image] =>[orig_patent_app_number] => 12360899 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/360899
Methods and apparatus related to address generation, communication and/or validation Jan 27, 2009 Issued
Array ( [id] => 5393404 [patent_doc_number] => 20090210717 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-08-20 [patent_title] => 'IMAGE PROCESSING APPARATUS, AUTHENTICATION PACKAGE INSTALLATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM' [patent_app_type] => utility [patent_app_number] => 12/361254 [patent_app_country] => US [patent_app_date] => 2009-01-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 4521 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0210/20090210717.pdf [firstpage_image] =>[orig_patent_app_number] => 12361254 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/361254
Image processing apparatus, authentication package installation method, and computer-readable recording medium Jan 27, 2009 Issued
Array ( [id] => 10172901 [patent_doc_number] => 09203620 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-12-01 [patent_title] => 'System, method and apparatus for secure use of cryptographic credentials in mobile devices' [patent_app_type] => utility [patent_app_number] => 12/360872 [patent_app_country] => US [patent_app_date] => 2009-01-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 4 [patent_no_of_words] => 5586 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 103 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12360872 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/360872
System, method and apparatus for secure use of cryptographic credentials in mobile devices Jan 27, 2009 Issued
Array ( [id] => 9593174 [patent_doc_number] => 08782740 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-07-15 [patent_title] => 'Systems and methods for detection of unauthorized or unsecured access points' [patent_app_type] => utility [patent_app_number] => 12/361354 [patent_app_country] => US [patent_app_date] => 2009-01-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5724 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 234 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12361354 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/361354
Systems and methods for detection of unauthorized or unsecured access points Jan 27, 2009 Issued
Array ( [id] => 6479218 [patent_doc_number] => 20100191970 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-29 [patent_title] => 'GENERATING PROTECTED ACCESS CREDENTIALS' [patent_app_type] => utility [patent_app_number] => 12/360742 [patent_app_country] => US [patent_app_date] => 2009-01-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6096 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0191/20100191970.pdf [firstpage_image] =>[orig_patent_app_number] => 12360742 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/360742
Generating protected access credentials Jan 26, 2009 Issued
Array ( [id] => 5381418 [patent_doc_number] => 20090193257 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-07-30 [patent_title] => 'RIGHTS OBJECT AUTHENTICATION IN ANCHOR POINT-BASED DIGITAL RIGHTS MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 12/360806 [patent_app_country] => US [patent_app_date] => 2009-01-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7676 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0193/20090193257.pdf [firstpage_image] =>[orig_patent_app_number] => 12360806 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/360806
Rights object authentication in anchor point-based digital rights management Jan 26, 2009 Issued
Array ( [id] => 5266894 [patent_doc_number] => 20090119579 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-05-07 [patent_title] => 'System for Monitoring Personal Computer Documents for Sensitive Data' [patent_app_type] => utility [patent_app_number] => 12/352191 [patent_app_country] => US [patent_app_date] => 2009-01-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2641 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0119/20090119579.pdf [firstpage_image] =>[orig_patent_app_number] => 12352191 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/352191
System for monitoring personal computer documents for sensitive data Jan 11, 2009 Issued
Array ( [id] => 6644603 [patent_doc_number] => 20100174631 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-07-08 [patent_title] => 'Secure device firmware' [patent_app_type] => utility [patent_app_number] => 12/319478 [patent_app_country] => US [patent_app_date] => 2009-01-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 3127 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0174/20100174631.pdf [firstpage_image] =>[orig_patent_app_number] => 12319478 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/319478
Secure device firmware Jan 6, 2009 Abandoned
Array ( [id] => 4614623 [patent_doc_number] => 07996911 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2011-08-09 [patent_title] => 'Memory card' [patent_app_type] => utility [patent_app_number] => 12/182123 [patent_app_country] => US [patent_app_date] => 2008-07-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 18 [patent_no_of_words] => 7156 [patent_no_of_claims] => 2 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/07/996/07996911.pdf [firstpage_image] =>[orig_patent_app_number] => 12182123 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/182123
Memory card Jul 28, 2008 Issued
Array ( [id] => 7803973 [patent_doc_number] => 08132258 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-03-06 [patent_title] => 'Remote security servers for protecting customer computers against computer security threats' [patent_app_type] => utility [patent_app_number] => 12/137870 [patent_app_country] => US [patent_app_date] => 2008-06-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5630 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/132/08132258.pdf [firstpage_image] =>[orig_patent_app_number] => 12137870 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/137870
Remote security servers for protecting customer computers against computer security threats Jun 11, 2008 Issued
Array ( [id] => 5376116 [patent_doc_number] => 20090313677 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-12-17 [patent_title] => 'Mathematical definition of roles and authorizations in RBAC system' [patent_app_type] => utility [patent_app_number] => 12/137767 [patent_app_country] => US [patent_app_date] => 2008-06-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4728 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0313/20090313677.pdf [firstpage_image] =>[orig_patent_app_number] => 12137767 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/137767
Mathematical definition of roles and authorizations in RBAC system Jun 11, 2008 Issued
Array ( [id] => 9023798 [patent_doc_number] => 08533797 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-09-10 [patent_title] => 'Using windows authentication in a workgroup to manage application users' [patent_app_type] => utility [patent_app_number] => 12/138302 [patent_app_country] => US [patent_app_date] => 2008-06-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 11 [patent_no_of_words] => 6085 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 147 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12138302 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/138302
Using windows authentication in a workgroup to manage application users Jun 11, 2008 Issued
Array ( [id] => 7777994 [patent_doc_number] => 08121287 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-02-21 [patent_title] => 'System, method, and service for performing unified broadcast encryption and traitor tracing for digital content' [patent_app_type] => utility [patent_app_number] => 12/133736 [patent_app_country] => US [patent_app_date] => 2008-06-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6465 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 169 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/121/08121287.pdf [firstpage_image] =>[orig_patent_app_number] => 12133736 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/133736
System, method, and service for performing unified broadcast encryption and traitor tracing for digital content Jun 4, 2008 Issued
Array ( [id] => 4854812 [patent_doc_number] => 20080320556 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-12-25 [patent_title] => 'METHOD FOR RECOGNIZING INFORMATION FLOW AND DETECTING INFORMATION LEAKAGE BY ANALYZING USER\'S BEHAVIORS' [patent_app_type] => utility [patent_app_number] => 12/039930 [patent_app_country] => US [patent_app_date] => 2008-02-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4912 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0320/20080320556.pdf [firstpage_image] =>[orig_patent_app_number] => 12039930 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/039930
Method for recognizing information flow and detecting information leakage by analyzing user's behaviors Feb 28, 2008 Issued
Menu