Search

Stephanie R Brecheisen

Examiner (ID: 4475)

Most Active Art Unit
3762
Art Unit(s)
3762
Total Applications
7
Issued Applications
3
Pending Applications
3
Abandoned Applications
1

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 17788570 [patent_doc_number] => 11411714 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-08-09 [patent_title] => Apparatus and method for performing operation using approximation function [patent_app_type] => utility [patent_app_number] => 16/884957 [patent_app_country] => US [patent_app_date] => 2020-05-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3488 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16884957 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/884957
Apparatus and method for performing operation using approximation function May 26, 2020 Issued
Array ( [id] => 18579759 [patent_doc_number] => 11736304 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-08-22 [patent_title] => Secure authentication of remote equipment [patent_app_type] => utility [patent_app_number] => 16/877726 [patent_app_country] => US [patent_app_date] => 2020-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8133 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 81 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16877726 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/877726
Secure authentication of remote equipment May 18, 2020 Issued
Array ( [id] => 16286953 [patent_doc_number] => 20200280555 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-09-03 [patent_title] => Method and System for Detecting Two-Factor Authentication [patent_app_type] => utility [patent_app_number] => 16/877605 [patent_app_country] => US [patent_app_date] => 2020-05-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7992 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16877605 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/877605
Method and system for detecting two-factor authentication May 18, 2020 Issued
Array ( [id] => 18997893 [patent_doc_number] => 11914738 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2024-02-27 [patent_title] => Categorizing a sensitive data field in a dataset [patent_app_type] => utility [patent_app_number] => 17/267838 [patent_app_country] => US [patent_app_date] => 2020-05-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 11 [patent_no_of_words] => 14912 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 159 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17267838 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/267838
Categorizing a sensitive data field in a dataset May 13, 2020 Issued
Array ( [id] => 17202370 [patent_doc_number] => 20210342465 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-11-04 [patent_title] => SECURITY CONTROL MANAGEMENT FOR INFORMATION SECURITY [patent_app_type] => utility [patent_app_number] => 16/862795 [patent_app_country] => US [patent_app_date] => 2020-04-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6929 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 202 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16862795 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/862795
Security control management for information security Apr 29, 2020 Issued
Array ( [id] => 17202334 [patent_doc_number] => 20210342429 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-11-04 [patent_title] => AUTOMATIC ANONYMOUS VISITOR IDENTITY RESOLUTION USING MACHINE LEARNING [patent_app_type] => utility [patent_app_number] => 16/862149 [patent_app_country] => US [patent_app_date] => 2020-04-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 12123 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16862149 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/862149
Automatic anonymous visitor identity resolution using machine learning Apr 28, 2020 Issued
Array ( [id] => 17781201 [patent_doc_number] => 20220247551 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2022-08-04 [patent_title] => METHODS AND SYSTEMS FOR PRIVACY PRESERVING EVALUATION OF MACHINE LEARNING MODELS [patent_app_type] => utility [patent_app_number] => 17/605836 [patent_app_country] => US [patent_app_date] => 2020-04-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 34914 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -14 [patent_words_short_claim] => 58 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17605836 [rel_patent_id] =>[rel_patent_doc_number] =>)
17/605836
METHODS AND SYSTEMS FOR PRIVACY PRESERVING EVALUATION OF MACHINE LEARNING MODELS Apr 22, 2020 Pending
Array ( [id] => 18521440 [patent_doc_number] => 11711340 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-07-25 [patent_title] => Protecting communication link between content delivery network and content origin server [patent_app_type] => utility [patent_app_number] => 16/853083 [patent_app_country] => US [patent_app_date] => 2020-04-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6707 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 123 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16853083 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/853083
Protecting communication link between content delivery network and content origin server Apr 19, 2020 Issued
Array ( [id] => 16363452 [patent_doc_number] => 20200320203 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-10-08 [patent_title] => CONTINUOUS RISK ASSESSMENT FOR ELECTRONIC PROTECTED HEALTH INFORMATION [patent_app_type] => utility [patent_app_number] => 16/841232 [patent_app_country] => US [patent_app_date] => 2020-04-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9456 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -20 [patent_words_short_claim] => 93 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16841232 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/841232
Continuous risk assessment for electronic protected health information Apr 5, 2020 Issued
Array ( [id] => 17731749 [patent_doc_number] => 11388158 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-07-12 [patent_title] => System and method for authenticating clients [patent_app_type] => utility [patent_app_number] => 16/839543 [patent_app_country] => US [patent_app_date] => 2020-04-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 7443 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 160 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16839543 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/839543
System and method for authenticating clients Apr 2, 2020 Issued
Array ( [id] => 16211447 [patent_doc_number] => 20200244437 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-07-30 [patent_title] => METHOD AND DEVICE FOR SECURITY ASSESSMENT OF ENCRYPTION MODELS [patent_app_type] => utility [patent_app_number] => 16/836725 [patent_app_country] => US [patent_app_date] => 2020-03-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9747 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 194 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16836725 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/836725
Method and device for security assessment of encryption models Mar 30, 2020 Issued
Array ( [id] => 17977634 [patent_doc_number] => 11494496 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-11-08 [patent_title] => Measuring overfitting of machine learning computer model and susceptibility to security threats [patent_app_type] => utility [patent_app_number] => 16/833884 [patent_app_country] => US [patent_app_date] => 2020-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 20 [patent_no_of_words] => 19493 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 196 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16833884 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/833884
Measuring overfitting of machine learning computer model and susceptibility to security threats Mar 29, 2020 Issued
Array ( [id] => 16330887 [patent_doc_number] => 20200301853 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-09-24 [patent_title] => Hacking-Resistant Computer Design [patent_app_type] => utility [patent_app_number] => 16/833355 [patent_app_country] => US [patent_app_date] => 2020-03-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11327 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -6 [patent_words_short_claim] => 179 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16833355 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/833355
Hacking-resistant computer design Mar 26, 2020 Issued
Array ( [id] => 16330887 [patent_doc_number] => 20200301853 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-09-24 [patent_title] => Hacking-Resistant Computer Design [patent_app_type] => utility [patent_app_number] => 16/833355 [patent_app_country] => US [patent_app_date] => 2020-03-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11327 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -6 [patent_words_short_claim] => 179 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16833355 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/833355
Hacking-resistant computer design Mar 26, 2020 Issued
Array ( [id] => 16330887 [patent_doc_number] => 20200301853 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-09-24 [patent_title] => Hacking-Resistant Computer Design [patent_app_type] => utility [patent_app_number] => 16/833355 [patent_app_country] => US [patent_app_date] => 2020-03-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11327 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -6 [patent_words_short_claim] => 179 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16833355 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/833355
Hacking-resistant computer design Mar 26, 2020 Issued
Array ( [id] => 16472563 [patent_doc_number] => 20200374101 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-11-26 [patent_title] => ENCRYPTION PROCESSING SYSTEM, ENCRYPTION PROCESSING DEVICE AND RECORDING MEDIUM [patent_app_type] => utility [patent_app_number] => 16/832136 [patent_app_country] => US [patent_app_date] => 2020-03-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11268 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -8 [patent_words_short_claim] => 101 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16832136 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/832136
Encryption processing system, encryption processing device and recording medium Mar 26, 2020 Issued
Array ( [id] => 16330887 [patent_doc_number] => 20200301853 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-09-24 [patent_title] => Hacking-Resistant Computer Design [patent_app_type] => utility [patent_app_number] => 16/833355 [patent_app_country] => US [patent_app_date] => 2020-03-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11327 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -6 [patent_words_short_claim] => 179 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16833355 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/833355
Hacking-resistant computer design Mar 26, 2020 Issued
Array ( [id] => 17771452 [patent_doc_number] => 11403395 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2022-08-02 [patent_title] => Method of using a dynamic rule engine with an application [patent_app_type] => utility [patent_app_number] => 16/831415 [patent_app_country] => US [patent_app_date] => 2020-03-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 6549 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 210 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16831415 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/831415
Method of using a dynamic rule engine with an application Mar 25, 2020 Issued
Array ( [id] => 18054736 [patent_doc_number] => 11528134 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2022-12-13 [patent_title] => Authentication using transformation verification [patent_app_type] => utility [patent_app_number] => 16/828294 [patent_app_country] => US [patent_app_date] => 2020-03-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9442 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16828294 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/828294
Authentication using transformation verification Mar 23, 2020 Issued
Array ( [id] => 17131598 [patent_doc_number] => 20210306367 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2021-09-30 [patent_title] => REDUCING ATTACK SURFACE BY SELECTIVELY COLLOCATING APPLICATIONS ON HOST COMPUTERS [patent_app_type] => utility [patent_app_number] => 16/827798 [patent_app_country] => US [patent_app_date] => 2020-03-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11246 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 62 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16827798 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/827798
Reducing attack surface by selectively collocating applications on host computers Mar 23, 2020 Issued
Menu