
Bryan R. Fischmann
Examiner (ID: 979)
| Most Active Art Unit | 3618 |
| Art Unit(s) | 3611, 3618 |
| Total Applications | 547 |
| Issued Applications | 419 |
| Pending Applications | 17 |
| Abandoned Applications | 111 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 4510962
[patent_doc_number] => 07949879
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-05-24
[patent_title] => 'Secure password entry'
[patent_app_type] => utility
[patent_app_number] => 12/427904
[patent_app_country] => US
[patent_app_date] => 2009-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 6504
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/949/07949879.pdf
[firstpage_image] =>[orig_patent_app_number] => 12427904
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/427904 | Secure password entry | Apr 21, 2009 | Issued |
Array
(
[id] => 6536677
[patent_doc_number] => 20100218255
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-26
[patent_title] => 'Procedure for the 100% infection free installation/re-installation, patching and maintenance of a personal computers operating system'
[patent_app_type] => utility
[patent_app_number] => 12/380253
[patent_app_country] => US
[patent_app_date] => 2009-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 1460
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0218/20100218255.pdf
[firstpage_image] =>[orig_patent_app_number] => 12380253
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/380253 | Procedure for the 100% infection free installation/re-installation, patching and maintenance of a personal computers operating system | Feb 23, 2009 | Abandoned |
Array
(
[id] => 6487933
[patent_doc_number] => 20100208888
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-19
[patent_title] => 'PASSWORD KEY DERIVATION SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 12/371370
[patent_app_country] => US
[patent_app_date] => 2009-02-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3433
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0208/20100208888.pdf
[firstpage_image] =>[orig_patent_app_number] => 12371370
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/371370 | Password key derivation system and method | Feb 12, 2009 | Issued |
Array
(
[id] => 9142301
[patent_doc_number] => 08582775
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-11-12
[patent_title] => 'Method of securing and authenticating data using micro-certificates'
[patent_app_type] => utility
[patent_app_number] => 12/370075
[patent_app_country] => US
[patent_app_date] => 2009-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 6348
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12370075
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/370075 | Method of securing and authenticating data using micro-certificates | Feb 11, 2009 | Issued |
Array
(
[id] => 5393383
[patent_doc_number] => 20090210696
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-08-20
[patent_title] => 'Method of bootstrapping an authenticated data session configuration'
[patent_app_type] => utility
[patent_app_number] => 12/378144
[patent_app_country] => US
[patent_app_date] => 2009-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10991
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0210/20090210696.pdf
[firstpage_image] =>[orig_patent_app_number] => 12378144
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/378144 | Method of bootstrapping an authenticated data session configuration | Feb 11, 2009 | Issued |
Array
(
[id] => 6481868
[patent_doc_number] => 20100192196
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-29
[patent_title] => 'HEALTH-BASED ACCESS TO NETWORK RESOURCES'
[patent_app_type] => utility
[patent_app_number] => 12/361548
[patent_app_country] => US
[patent_app_date] => 2009-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5092
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0192/20100192196.pdf
[firstpage_image] =>[orig_patent_app_number] => 12361548
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/361548 | Health-based access to network resources | Jan 28, 2009 | Issued |
Array
(
[id] => 6448703
[patent_doc_number] => 20100189264
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-29
[patent_title] => 'METHODS AND APPARATUS RELATED TO ADDRESS GENERATION, COMMUNICATION AND/OR VALIDATION'
[patent_app_type] => utility
[patent_app_number] => 12/360899
[patent_app_country] => US
[patent_app_date] => 2009-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 10084
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0189/20100189264.pdf
[firstpage_image] =>[orig_patent_app_number] => 12360899
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/360899 | Methods and apparatus related to address generation, communication and/or validation | Jan 27, 2009 | Issued |
Array
(
[id] => 5393404
[patent_doc_number] => 20090210717
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-08-20
[patent_title] => 'IMAGE PROCESSING APPARATUS, AUTHENTICATION PACKAGE INSTALLATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM'
[patent_app_type] => utility
[patent_app_number] => 12/361254
[patent_app_country] => US
[patent_app_date] => 2009-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 4521
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0210/20090210717.pdf
[firstpage_image] =>[orig_patent_app_number] => 12361254
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/361254 | Image processing apparatus, authentication package installation method, and computer-readable recording medium | Jan 27, 2009 | Issued |
Array
(
[id] => 10172901
[patent_doc_number] => 09203620
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-01
[patent_title] => 'System, method and apparatus for secure use of cryptographic credentials in mobile devices'
[patent_app_type] => utility
[patent_app_number] => 12/360872
[patent_app_country] => US
[patent_app_date] => 2009-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 4
[patent_no_of_words] => 5586
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12360872
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/360872 | System, method and apparatus for secure use of cryptographic credentials in mobile devices | Jan 27, 2009 | Issued |
Array
(
[id] => 9593174
[patent_doc_number] => 08782740
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-07-15
[patent_title] => 'Systems and methods for detection of unauthorized or unsecured access points'
[patent_app_type] => utility
[patent_app_number] => 12/361354
[patent_app_country] => US
[patent_app_date] => 2009-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5724
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12361354
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/361354 | Systems and methods for detection of unauthorized or unsecured access points | Jan 27, 2009 | Issued |
Array
(
[id] => 6479218
[patent_doc_number] => 20100191970
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-29
[patent_title] => 'GENERATING PROTECTED ACCESS CREDENTIALS'
[patent_app_type] => utility
[patent_app_number] => 12/360742
[patent_app_country] => US
[patent_app_date] => 2009-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6096
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0191/20100191970.pdf
[firstpage_image] =>[orig_patent_app_number] => 12360742
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/360742 | Generating protected access credentials | Jan 26, 2009 | Issued |
Array
(
[id] => 5381418
[patent_doc_number] => 20090193257
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-07-30
[patent_title] => 'RIGHTS OBJECT AUTHENTICATION IN ANCHOR POINT-BASED DIGITAL RIGHTS MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 12/360806
[patent_app_country] => US
[patent_app_date] => 2009-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7676
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0193/20090193257.pdf
[firstpage_image] =>[orig_patent_app_number] => 12360806
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/360806 | Rights object authentication in anchor point-based digital rights management | Jan 26, 2009 | Issued |
Array
(
[id] => 5266894
[patent_doc_number] => 20090119579
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-05-07
[patent_title] => 'System for Monitoring Personal Computer Documents for Sensitive Data'
[patent_app_type] => utility
[patent_app_number] => 12/352191
[patent_app_country] => US
[patent_app_date] => 2009-01-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2641
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0119/20090119579.pdf
[firstpage_image] =>[orig_patent_app_number] => 12352191
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/352191 | System for monitoring personal computer documents for sensitive data | Jan 11, 2009 | Issued |
Array
(
[id] => 6644603
[patent_doc_number] => 20100174631
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-08
[patent_title] => 'Secure device firmware'
[patent_app_type] => utility
[patent_app_number] => 12/319478
[patent_app_country] => US
[patent_app_date] => 2009-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3127
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0174/20100174631.pdf
[firstpage_image] =>[orig_patent_app_number] => 12319478
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/319478 | Secure device firmware | Jan 6, 2009 | Abandoned |
Array
(
[id] => 4614623
[patent_doc_number] => 07996911
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-08-09
[patent_title] => 'Memory card'
[patent_app_type] => utility
[patent_app_number] => 12/182123
[patent_app_country] => US
[patent_app_date] => 2008-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 18
[patent_no_of_words] => 7156
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/996/07996911.pdf
[firstpage_image] =>[orig_patent_app_number] => 12182123
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/182123 | Memory card | Jul 28, 2008 | Issued |
Array
(
[id] => 7803973
[patent_doc_number] => 08132258
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-03-06
[patent_title] => 'Remote security servers for protecting customer computers against computer security threats'
[patent_app_type] => utility
[patent_app_number] => 12/137870
[patent_app_country] => US
[patent_app_date] => 2008-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5630
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/132/08132258.pdf
[firstpage_image] =>[orig_patent_app_number] => 12137870
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/137870 | Remote security servers for protecting customer computers against computer security threats | Jun 11, 2008 | Issued |
Array
(
[id] => 5376116
[patent_doc_number] => 20090313677
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-17
[patent_title] => 'Mathematical definition of roles and authorizations in RBAC system'
[patent_app_type] => utility
[patent_app_number] => 12/137767
[patent_app_country] => US
[patent_app_date] => 2008-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4728
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0313/20090313677.pdf
[firstpage_image] =>[orig_patent_app_number] => 12137767
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/137767 | Mathematical definition of roles and authorizations in RBAC system | Jun 11, 2008 | Issued |
Array
(
[id] => 9023798
[patent_doc_number] => 08533797
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-09-10
[patent_title] => 'Using windows authentication in a workgroup to manage application users'
[patent_app_type] => utility
[patent_app_number] => 12/138302
[patent_app_country] => US
[patent_app_date] => 2008-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 6085
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 147
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12138302
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/138302 | Using windows authentication in a workgroup to manage application users | Jun 11, 2008 | Issued |
Array
(
[id] => 7777994
[patent_doc_number] => 08121287
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-02-21
[patent_title] => 'System, method, and service for performing unified broadcast encryption and traitor tracing for digital content'
[patent_app_type] => utility
[patent_app_number] => 12/133736
[patent_app_country] => US
[patent_app_date] => 2008-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6465
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/121/08121287.pdf
[firstpage_image] =>[orig_patent_app_number] => 12133736
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/133736 | System, method, and service for performing unified broadcast encryption and traitor tracing for digital content | Jun 4, 2008 | Issued |
Array
(
[id] => 4854812
[patent_doc_number] => 20080320556
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-12-25
[patent_title] => 'METHOD FOR RECOGNIZING INFORMATION FLOW AND DETECTING INFORMATION LEAKAGE BY ANALYZING USER\'S BEHAVIORS'
[patent_app_type] => utility
[patent_app_number] => 12/039930
[patent_app_country] => US
[patent_app_date] => 2008-02-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4912
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0320/20080320556.pdf
[firstpage_image] =>[orig_patent_app_number] => 12039930
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/039930 | Method for recognizing information flow and detecting information leakage by analyzing user's behaviors | Feb 28, 2008 | Issued |