![](/images/general/no_picture/200_user.png)
Stephanie R Brecheisen
Examiner (ID: 4475)
Most Active Art Unit | 3762 |
Art Unit(s) | 3762 |
Total Applications | 7 |
Issued Applications | 3 |
Pending Applications | 3 |
Abandoned Applications | 1 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 15824921
[patent_doc_number] => 10637666
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-04-28
[patent_title] => Migrating data for decentralized applications between disparate backend storage providers
[patent_app_type] => utility
[patent_app_number] => 16/555632
[patent_app_country] => US
[patent_app_date] => 2019-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 6395
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 249
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16555632
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/555632 | Migrating data for decentralized applications between disparate backend storage providers | Aug 28, 2019 | Issued |
Array
(
[id] => 17817540
[patent_doc_number] => 11423155
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-23
[patent_title] => Software vulnerability detection in managed networks
[patent_app_type] => utility
[patent_app_number] => 16/554218
[patent_app_country] => US
[patent_app_date] => 2019-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 14815
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16554218
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/554218 | Software vulnerability detection in managed networks | Aug 27, 2019 | Issued |
Array
(
[id] => 15186857
[patent_doc_number] => 20190364020
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-28
[patent_title] => Policy Enforcement Point for a Multi-Tenant Identity and Data Security Management Cloud Service
[patent_app_type] => utility
[patent_app_number] => 16/537722
[patent_app_country] => US
[patent_app_date] => 2019-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 20100
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16537722
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/537722 | Policy enforcement point for a multi-tenant identity and data security management cloud service | Aug 11, 2019 | Issued |
Array
(
[id] => 17283291
[patent_doc_number] => 11200321
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-12-14
[patent_title] => Maintaining trust on a data storage network
[patent_app_type] => utility
[patent_app_number] => 16/530198
[patent_app_country] => US
[patent_app_date] => 2019-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 13
[patent_no_of_words] => 15718
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16530198
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/530198 | Maintaining trust on a data storage network | Aug 1, 2019 | Issued |
Array
(
[id] => 17787618
[patent_doc_number] => 11410752
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-09
[patent_title] => Method of synthesizing chemical compounds
[patent_app_type] => utility
[patent_app_number] => 16/772293
[patent_app_country] => US
[patent_app_date] => 2019-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3092
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16772293
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/772293 | Method of synthesizing chemical compounds | Jul 29, 2019 | Issued |
Array
(
[id] => 17717581
[patent_doc_number] => 11381588
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-05
[patent_title] => Cybersecurity vulnerability classification and remediation based on installation base
[patent_app_type] => utility
[patent_app_number] => 16/525899
[patent_app_country] => US
[patent_app_date] => 2019-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 11303
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 239
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16525899
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/525899 | Cybersecurity vulnerability classification and remediation based on installation base | Jul 29, 2019 | Issued |
Array
(
[id] => 15156419
[patent_doc_number] => 20190356687
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-21
[patent_title] => ATTACK DETECTION METHOD, ATTACK DETECTION DEVICE AND BUS SYSTEM FOR A MOTOR VEHICLE
[patent_app_type] => utility
[patent_app_number] => 16/524016
[patent_app_country] => US
[patent_app_date] => 2019-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10912
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16524016
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/524016 | Attack detection method, attack detection device and bus system for a motor vehicle | Jul 26, 2019 | Issued |
Array
(
[id] => 17033604
[patent_doc_number] => 11095428
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-17
[patent_title] => Hybrid system and method for secure collaboration using homomorphic encryption and trusted hardware
[patent_app_type] => utility
[patent_app_number] => 16/520618
[patent_app_country] => US
[patent_app_date] => 2019-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7144
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16520618
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/520618 | Hybrid system and method for secure collaboration using homomorphic encryption and trusted hardware | Jul 23, 2019 | Issued |
Array
(
[id] => 15125547
[patent_doc_number] => 20190349407
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-14
[patent_title] => THREAT IDENTIFICATION-BASED COLLECTION OF FORENSIC DATA FROM ENDPOINT DEVICES
[patent_app_type] => utility
[patent_app_number] => 16/520114
[patent_app_country] => US
[patent_app_date] => 2019-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 30405
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16520114
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/520114 | Threat identification-based collection of forensic data from endpoint devices | Jul 22, 2019 | Issued |
Array
(
[id] => 16910605
[patent_doc_number] => 11042648
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-22
[patent_title] => Quantification of privacy risk in location trajectories
[patent_app_type] => utility
[patent_app_number] => 16/514409
[patent_app_country] => US
[patent_app_date] => 2019-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 17861
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16514409
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/514409 | Quantification of privacy risk in location trajectories | Jul 16, 2019 | Issued |
Array
(
[id] => 16678568
[patent_doc_number] => 20210067334
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-04
[patent_title] => System and Method for Cryptographic Key Fragments Management
[patent_app_type] => utility
[patent_app_number] => 16/508410
[patent_app_country] => US
[patent_app_date] => 2019-07-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12393
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -20
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16508410
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/508410 | System and method for cryptographic key fragments management | Jul 10, 2019 | Issued |
Array
(
[id] => 17380146
[patent_doc_number] => 11238163
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-02-01
[patent_title] => Method for objectively and completely indentifying system residual vulnerabilities
[patent_app_type] => utility
[patent_app_number] => 16/454820
[patent_app_country] => US
[patent_app_date] => 2019-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 18
[patent_no_of_words] => 10104
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16454820
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/454820 | Method for objectively and completely indentifying system residual vulnerabilities | Jun 26, 2019 | Issued |
Array
(
[id] => 16546343
[patent_doc_number] => 20200412758
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-31
[patent_title] => COMPREHENSIVE RISK ASSESSMENT
[patent_app_type] => utility
[patent_app_number] => 16/454729
[patent_app_country] => US
[patent_app_date] => 2019-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16828
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16454729
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/454729 | Comprehensive risk assessment | Jun 26, 2019 | Issued |
Array
(
[id] => 17380145
[patent_doc_number] => 11238162
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-02-01
[patent_title] => Method for systematically and objectively assessing system security risk
[patent_app_type] => utility
[patent_app_number] => 16/454744
[patent_app_country] => US
[patent_app_date] => 2019-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5590
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16454744
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/454744 | Method for systematically and objectively assessing system security risk | Jun 26, 2019 | Issued |
Array
(
[id] => 15298057
[patent_doc_number] => 20190392164
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-26
[patent_title] => APPLICATION LEVEL DATA SECURITY
[patent_app_type] => utility
[patent_app_number] => 16/452150
[patent_app_country] => US
[patent_app_date] => 2019-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12900
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16452150
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/452150 | Application level data security | Jun 24, 2019 | Issued |
Array
(
[id] => 16740026
[patent_doc_number] => 10965704
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-30
[patent_title] => Identifying self-signed certificates using HTTP access logs for malware detection
[patent_app_type] => utility
[patent_app_number] => 16/447150
[patent_app_country] => US
[patent_app_date] => 2019-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5748
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16447150
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/447150 | Identifying self-signed certificates using HTTP access logs for malware detection | Jun 19, 2019 | Issued |
Array
(
[id] => 17240488
[patent_doc_number] => 11184384
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-23
[patent_title] => Information technology security assessment model for process flows and associated automated remediation
[patent_app_type] => utility
[patent_app_number] => 16/440289
[patent_app_country] => US
[patent_app_date] => 2019-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7394
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 269
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16440289
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/440289 | Information technology security assessment model for process flows and associated automated remediation | Jun 12, 2019 | Issued |
Array
(
[id] => 17240452
[patent_doc_number] => 11184348
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-11-23
[patent_title] => Dynamic certificate generation on a certificate authority cloud
[patent_app_type] => utility
[patent_app_number] => 16/437751
[patent_app_country] => US
[patent_app_date] => 2019-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5198
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16437751
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/437751 | Dynamic certificate generation on a certificate authority cloud | Jun 10, 2019 | Issued |
Array
(
[id] => 16866655
[patent_doc_number] => 11025418
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-06-01
[patent_title] => Cryptographic entropy tree
[patent_app_type] => utility
[patent_app_number] => 16/436328
[patent_app_country] => US
[patent_app_date] => 2019-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 10087
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16436328
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/436328 | Cryptographic entropy tree | Jun 9, 2019 | Issued |
Array
(
[id] => 14936589
[patent_doc_number] => 20190303933
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-03
[patent_title] => NOVEL APPLICATION OF BLOCKCHAIN DATA STRUCTURE FOR INSURANCE CERTIFICATE MANAGEMENT
[patent_app_type] => utility
[patent_app_number] => 16/432870
[patent_app_country] => US
[patent_app_date] => 2019-06-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2050
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 51
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16432870
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/432870 | NOVEL APPLICATION OF BLOCKCHAIN DATA STRUCTURE FOR INSURANCE CERTIFICATE MANAGEMENT | Jun 4, 2019 | Abandoned |