Search

Stephanie R Brecheisen

Examiner (ID: 4475)

Most Active Art Unit
3762
Art Unit(s)
3762
Total Applications
7
Issued Applications
3
Pending Applications
3
Abandoned Applications
1

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 15824921 [patent_doc_number] => 10637666 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-04-28 [patent_title] => Migrating data for decentralized applications between disparate backend storage providers [patent_app_type] => utility [patent_app_number] => 16/555632 [patent_app_country] => US [patent_app_date] => 2019-08-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 9 [patent_no_of_words] => 6395 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 249 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16555632 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/555632
Migrating data for decentralized applications between disparate backend storage providers Aug 28, 2019 Issued
Array ( [id] => 17817540 [patent_doc_number] => 11423155 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-08-23 [patent_title] => Software vulnerability detection in managed networks [patent_app_type] => utility [patent_app_number] => 16/554218 [patent_app_country] => US [patent_app_date] => 2019-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 14815 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 198 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16554218 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/554218
Software vulnerability detection in managed networks Aug 27, 2019 Issued
Array ( [id] => 15186857 [patent_doc_number] => 20190364020 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-11-28 [patent_title] => Policy Enforcement Point for a Multi-Tenant Identity and Data Security Management Cloud Service [patent_app_type] => utility [patent_app_number] => 16/537722 [patent_app_country] => US [patent_app_date] => 2019-08-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 20100 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 94 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16537722 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/537722
Policy enforcement point for a multi-tenant identity and data security management cloud service Aug 11, 2019 Issued
Array ( [id] => 17283291 [patent_doc_number] => 11200321 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-12-14 [patent_title] => Maintaining trust on a data storage network [patent_app_type] => utility [patent_app_number] => 16/530198 [patent_app_country] => US [patent_app_date] => 2019-08-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 13 [patent_no_of_words] => 15718 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 206 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16530198 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/530198
Maintaining trust on a data storage network Aug 1, 2019 Issued
Array ( [id] => 17787618 [patent_doc_number] => 11410752 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-08-09 [patent_title] => Method of synthesizing chemical compounds [patent_app_type] => utility [patent_app_number] => 16/772293 [patent_app_country] => US [patent_app_date] => 2019-07-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3092 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 93 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16772293 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/772293
Method of synthesizing chemical compounds Jul 29, 2019 Issued
Array ( [id] => 17717581 [patent_doc_number] => 11381588 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-07-05 [patent_title] => Cybersecurity vulnerability classification and remediation based on installation base [patent_app_type] => utility [patent_app_number] => 16/525899 [patent_app_country] => US [patent_app_date] => 2019-07-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 11 [patent_no_of_words] => 11303 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 239 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16525899 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/525899
Cybersecurity vulnerability classification and remediation based on installation base Jul 29, 2019 Issued
Array ( [id] => 15156419 [patent_doc_number] => 20190356687 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-11-21 [patent_title] => ATTACK DETECTION METHOD, ATTACK DETECTION DEVICE AND BUS SYSTEM FOR A MOTOR VEHICLE [patent_app_type] => utility [patent_app_number] => 16/524016 [patent_app_country] => US [patent_app_date] => 2019-07-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10912 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16524016 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/524016
Attack detection method, attack detection device and bus system for a motor vehicle Jul 26, 2019 Issued
Array ( [id] => 17033604 [patent_doc_number] => 11095428 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-08-17 [patent_title] => Hybrid system and method for secure collaboration using homomorphic encryption and trusted hardware [patent_app_type] => utility [patent_app_number] => 16/520618 [patent_app_country] => US [patent_app_date] => 2019-07-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 7144 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16520618 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/520618
Hybrid system and method for secure collaboration using homomorphic encryption and trusted hardware Jul 23, 2019 Issued
Array ( [id] => 15125547 [patent_doc_number] => 20190349407 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-11-14 [patent_title] => THREAT IDENTIFICATION-BASED COLLECTION OF FORENSIC DATA FROM ENDPOINT DEVICES [patent_app_type] => utility [patent_app_number] => 16/520114 [patent_app_country] => US [patent_app_date] => 2019-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 30405 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -27 [patent_words_short_claim] => 94 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16520114 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/520114
Threat identification-based collection of forensic data from endpoint devices Jul 22, 2019 Issued
Array ( [id] => 16910605 [patent_doc_number] => 11042648 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-06-22 [patent_title] => Quantification of privacy risk in location trajectories [patent_app_type] => utility [patent_app_number] => 16/514409 [patent_app_country] => US [patent_app_date] => 2019-07-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 17861 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16514409 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/514409
Quantification of privacy risk in location trajectories Jul 16, 2019 Issued
Array ( [id] => 16678568 [patent_doc_number] => 20210067334 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-03-04 [patent_title] => System and Method for Cryptographic Key Fragments Management [patent_app_type] => utility [patent_app_number] => 16/508410 [patent_app_country] => US [patent_app_date] => 2019-07-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12393 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -20 [patent_words_short_claim] => 97 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16508410 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/508410
System and method for cryptographic key fragments management Jul 10, 2019 Issued
Array ( [id] => 17380146 [patent_doc_number] => 11238163 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2022-02-01 [patent_title] => Method for objectively and completely indentifying system residual vulnerabilities [patent_app_type] => utility [patent_app_number] => 16/454820 [patent_app_country] => US [patent_app_date] => 2019-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 18 [patent_no_of_words] => 10104 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16454820 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/454820
Method for objectively and completely indentifying system residual vulnerabilities Jun 26, 2019 Issued
Array ( [id] => 16546343 [patent_doc_number] => 20200412758 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-12-31 [patent_title] => COMPREHENSIVE RISK ASSESSMENT [patent_app_type] => utility [patent_app_number] => 16/454729 [patent_app_country] => US [patent_app_date] => 2019-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 16828 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 108 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16454729 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/454729
Comprehensive risk assessment Jun 26, 2019 Issued
Array ( [id] => 17380145 [patent_doc_number] => 11238162 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2022-02-01 [patent_title] => Method for systematically and objectively assessing system security risk [patent_app_type] => utility [patent_app_number] => 16/454744 [patent_app_country] => US [patent_app_date] => 2019-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5590 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 189 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16454744 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/454744
Method for systematically and objectively assessing system security risk Jun 26, 2019 Issued
Array ( [id] => 15298057 [patent_doc_number] => 20190392164 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-12-26 [patent_title] => APPLICATION LEVEL DATA SECURITY [patent_app_type] => utility [patent_app_number] => 16/452150 [patent_app_country] => US [patent_app_date] => 2019-06-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12900 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 76 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16452150 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/452150
Application level data security Jun 24, 2019 Issued
Array ( [id] => 16740026 [patent_doc_number] => 10965704 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-03-30 [patent_title] => Identifying self-signed certificates using HTTP access logs for malware detection [patent_app_type] => utility [patent_app_number] => 16/447150 [patent_app_country] => US [patent_app_date] => 2019-06-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5748 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 110 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16447150 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/447150
Identifying self-signed certificates using HTTP access logs for malware detection Jun 19, 2019 Issued
Array ( [id] => 17240488 [patent_doc_number] => 11184384 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-11-23 [patent_title] => Information technology security assessment model for process flows and associated automated remediation [patent_app_type] => utility [patent_app_number] => 16/440289 [patent_app_country] => US [patent_app_date] => 2019-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7394 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 269 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16440289 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/440289
Information technology security assessment model for process flows and associated automated remediation Jun 12, 2019 Issued
Array ( [id] => 17240452 [patent_doc_number] => 11184348 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-11-23 [patent_title] => Dynamic certificate generation on a certificate authority cloud [patent_app_type] => utility [patent_app_number] => 16/437751 [patent_app_country] => US [patent_app_date] => 2019-06-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5198 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 190 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16437751 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/437751
Dynamic certificate generation on a certificate authority cloud Jun 10, 2019 Issued
Array ( [id] => 16866655 [patent_doc_number] => 11025418 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-06-01 [patent_title] => Cryptographic entropy tree [patent_app_type] => utility [patent_app_number] => 16/436328 [patent_app_country] => US [patent_app_date] => 2019-06-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 10087 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 124 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16436328 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/436328
Cryptographic entropy tree Jun 9, 2019 Issued
Array ( [id] => 14936589 [patent_doc_number] => 20190303933 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-10-03 [patent_title] => NOVEL APPLICATION OF BLOCKCHAIN DATA STRUCTURE FOR INSURANCE CERTIFICATE MANAGEMENT [patent_app_type] => utility [patent_app_number] => 16/432870 [patent_app_country] => US [patent_app_date] => 2019-06-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2050 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => 0 [patent_words_short_claim] => 51 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16432870 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/432870
NOVEL APPLICATION OF BLOCKCHAIN DATA STRUCTURE FOR INSURANCE CERTIFICATE MANAGEMENT Jun 4, 2019 Abandoned
Menu