
Christopher J. Brown
Examiner (ID: 10584)
| Most Active Art Unit | 2439 |
| Art Unit(s) | 2134, 2439, 2434 |
| Total Applications | 972 |
| Issued Applications | 641 |
| Pending Applications | 123 |
| Abandoned Applications | 224 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15367635
[patent_doc_number] => 20200019582
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-16
[patent_title] => IDENTIFYING WEBPAGES ACCESSIBLE BY UNAUTHORIZED USERS VIA URL GUESSING OR NETWORK SNIFFING
[patent_app_type] => utility
[patent_app_number] => 16/580436
[patent_app_country] => US
[patent_app_date] => 2019-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7589
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 179
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16580436
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/580436 | Identifying webpages accessible by unauthorized users via URL guessing or network sniffing | Sep 23, 2019 | Issued |
Array
(
[id] => 17093865
[patent_doc_number] => 11122068
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-09-14
[patent_title] => Network security database filtering tool
[patent_app_type] => utility
[patent_app_number] => 16/577170
[patent_app_country] => US
[patent_app_date] => 2019-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8400
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16577170
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/577170 | Network security database filtering tool | Sep 19, 2019 | Issued |
Array
(
[id] => 16693347
[patent_doc_number] => 20210075826
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-11
[patent_title] => SYSTEMS AND METHODS FOR DETECTING PHISHING WEBSITES
[patent_app_type] => utility
[patent_app_number] => 16/566537
[patent_app_country] => US
[patent_app_date] => 2019-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10761
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16566537
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/566537 | Systems and methods for detecting phishing websites | Sep 9, 2019 | Issued |
Array
(
[id] => 16146209
[patent_doc_number] => 10706176
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-07
[patent_title] => Data-processing consent refresh, re-prompt, and recapture systems and related methods
[patent_app_type] => utility
[patent_app_number] => 16/560889
[patent_app_country] => US
[patent_app_date] => 2019-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 84
[patent_figures_cnt] => 86
[patent_no_of_words] => 57998
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16560889
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/560889 | Data-processing consent refresh, re-prompt, and recapture systems and related methods | Sep 3, 2019 | Issued |
Array
(
[id] => 16737927
[patent_doc_number] => 10963580
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-30
[patent_title] => Systems and methods for rule based dynamic selection of rendering browsers
[patent_app_type] => utility
[patent_app_number] => 16/534951
[patent_app_country] => US
[patent_app_date] => 2019-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 7786
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16534951
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/534951 | Systems and methods for rule based dynamic selection of rendering browsers | Aug 6, 2019 | Issued |
Array
(
[id] => 16646388
[patent_doc_number] => 10924262
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-02-16
[patent_title] => Method for processing dynamic data by fully homomorphic encryption method
[patent_app_type] => utility
[patent_app_number] => 16/534665
[patent_app_country] => US
[patent_app_date] => 2019-08-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4313
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16534665
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/534665 | Method for processing dynamic data by fully homomorphic encryption method | Aug 6, 2019 | Issued |
Array
(
[id] => 16618390
[patent_doc_number] => 20210037043
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-04
[patent_title] => MODIFYING TRIAGE INFORMATION BASED ON NETWORK MONITORING
[patent_app_type] => utility
[patent_app_number] => 16/525290
[patent_app_country] => US
[patent_app_date] => 2019-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17477
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 247
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16525290
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/525290 | Modifying triage information based on network monitoring | Jul 28, 2019 | Issued |
Array
(
[id] => 16602633
[patent_doc_number] => 20210029164
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-01-28
[patent_title] => USER RESPONSES TO CYBER SECURITY THREATS
[patent_app_type] => utility
[patent_app_number] => 16/520971
[patent_app_country] => US
[patent_app_date] => 2019-07-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9213
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16520971
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/520971 | User responses to cyber security threats | Jul 23, 2019 | Issued |
Array
(
[id] => 15044055
[patent_doc_number] => 20190333032
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-31
[patent_title] => ENFORCING MULTI-USE CONSTRAINTS ON A BLOCKCHAIN
[patent_app_type] => utility
[patent_app_number] => 16/504866
[patent_app_country] => US
[patent_app_date] => 2019-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3704
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16504866
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/504866 | Enforcing multi-use constraints on a blockchain | Jul 7, 2019 | Issued |
Array
(
[id] => 17879532
[patent_doc_number] => 11451570
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-09-20
[patent_title] => Computer system security scan
[patent_app_type] => utility
[patent_app_number] => 16/455553
[patent_app_country] => US
[patent_app_date] => 2019-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6360
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 197
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16455553
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/455553 | Computer system security scan | Jun 26, 2019 | Issued |
Array
(
[id] => 17942768
[patent_doc_number] => 11477240
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-10-18
[patent_title] => Remote monitoring of a security operations center (SOC)
[patent_app_type] => utility
[patent_app_number] => 16/452667
[patent_app_country] => US
[patent_app_date] => 2019-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 11
[patent_no_of_words] => 7660
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 320
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16452667
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/452667 | Remote monitoring of a security operations center (SOC) | Jun 25, 2019 | Issued |
Array
(
[id] => 16797114
[patent_doc_number] => 20210126932
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-04-29
[patent_title] => SYSTEM FOR TECHNOLOGY INFRASTRUCTURE ANALYSIS
[patent_app_type] => utility
[patent_app_number] => 17/253547
[patent_app_country] => US
[patent_app_date] => 2019-06-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6453
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17253547
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/253547 | SYSTEM FOR TECHNOLOGY INFRASTRUCTURE ANALYSIS | Jun 19, 2019 | Abandoned |
Array
(
[id] => 16740399
[patent_doc_number] => 10966083
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-03-30
[patent_title] => Anchor key generation method, device, and system
[patent_app_type] => utility
[patent_app_number] => 16/441598
[patent_app_country] => US
[patent_app_date] => 2019-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 26
[patent_no_of_words] => 19738
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16441598
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/441598 | Anchor key generation method, device, and system | Jun 13, 2019 | Issued |
Array
(
[id] => 16488910
[patent_doc_number] => 20200382524
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-12-03
[patent_title] => SYSTEM AND METHOD FOR A SECURE NETWORK
[patent_app_type] => utility
[patent_app_number] => 16/423281
[patent_app_country] => US
[patent_app_date] => 2019-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8897
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 70
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16423281
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/423281 | SYSTEM AND METHOD FOR A SECURE NETWORK | May 27, 2019 | Abandoned |
Array
(
[id] => 17979618
[patent_doc_number] => 11496503
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-11-08
[patent_title] => Event data fencing based on vulnerability detection
[patent_app_type] => utility
[patent_app_number] => 16/415000
[patent_app_country] => US
[patent_app_date] => 2019-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9276
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16415000
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/415000 | Event data fencing based on vulnerability detection | May 16, 2019 | Issued |
Array
(
[id] => 16426108
[patent_doc_number] => 20200351306
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-05
[patent_title] => CONFIGURING SECURITY POLICIES IN RESPONSE TO DETECTING A PIVOT OF AN INTRUSION
[patent_app_type] => utility
[patent_app_number] => 16/402946
[patent_app_country] => US
[patent_app_date] => 2019-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 12985
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16402946
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/402946 | CONFIGURING SECURITY POLICIES IN RESPONSE TO DETECTING A PIVOT OF AN INTRUSION | May 2, 2019 | Abandoned |
Array
(
[id] => 15095025
[patent_doc_number] => 20190342324
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-07
[patent_title] => COMPUTER VULNERABILITY ASSESSMENT AND REMEDIATION
[patent_app_type] => utility
[patent_app_number] => 16/401873
[patent_app_country] => US
[patent_app_date] => 2019-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10011
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16401873
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/401873 | COMPUTER VULNERABILITY ASSESSMENT AND REMEDIATION | May 1, 2019 | Abandoned |
Array
(
[id] => 16426095
[patent_doc_number] => 20200351293
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-11-05
[patent_title] => OUT-OF-BAND MANAGEMENT SECURITY ANALYSIS AND MONITORING
[patent_app_type] => utility
[patent_app_number] => 16/398984
[patent_app_country] => US
[patent_app_date] => 2019-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5868
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16398984
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/398984 | Out-of-band management security analysis and monitoring | Apr 29, 2019 | Issued |
Array
(
[id] => 14725651
[patent_doc_number] => 20190253889
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-15
[patent_title] => Anchor Key Generation Method, Device, and System
[patent_app_type] => utility
[patent_app_number] => 16/388606
[patent_app_country] => US
[patent_app_date] => 2019-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19855
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16388606
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/388606 | Anchor key generation method, device, and system | Apr 17, 2019 | Issued |
Array
(
[id] => 17826772
[patent_doc_number] => 11431734
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-08-30
[patent_title] => Adaptive rule generation for security event correlation
[patent_app_type] => utility
[patent_app_number] => 16/387632
[patent_app_country] => US
[patent_app_date] => 2019-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9662
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 281
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16387632
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/387632 | Adaptive rule generation for security event correlation | Apr 17, 2019 | Issued |