
Christopher J. Brown
Examiner (ID: 10584)
| Most Active Art Unit | 2439 |
| Art Unit(s) | 2134, 2439, 2434 |
| Total Applications | 972 |
| Issued Applications | 641 |
| Pending Applications | 123 |
| Abandoned Applications | 224 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15705589
[patent_doc_number] => 10608989
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-31
[patent_title] => Real time dynamic client access control
[patent_app_type] => utility
[patent_app_number] => 16/027537
[patent_app_country] => US
[patent_app_date] => 2018-07-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 11950
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 394
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16027537
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/027537 | Real time dynamic client access control | Jul 4, 2018 | Issued |
Array
(
[id] => 16173952
[patent_doc_number] => 10715540
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-07-14
[patent_title] => Protection from malicious and/or harmful content in cloud-based service scenarios
[patent_app_type] => utility
[patent_app_number] => 16/019786
[patent_app_country] => US
[patent_app_date] => 2018-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7492
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 268
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16019786
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/019786 | Protection from malicious and/or harmful content in cloud-based service scenarios | Jun 26, 2018 | Issued |
Array
(
[id] => 13907179
[patent_doc_number] => 20190042794
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-07
[patent_title] => SYSTEMS AND METHODS FOR AUTHENTICATING AND PROTECTING THE INTEGRITY OF DATA STREAMS AND OTHER DATA
[patent_app_type] => utility
[patent_app_number] => 16/010004
[patent_app_country] => US
[patent_app_date] => 2018-06-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11359
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -21
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16010004
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/010004 | SYSTEMS AND METHODS FOR AUTHENTICATING AND PROTECTING THE INTEGRITY OF DATA STREAMS AND OTHER DATA | Jun 14, 2018 | Abandoned |
Array
(
[id] => 13449529
[patent_doc_number] => 20180276307
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-27
[patent_title] => IDENTIFYING WEBPAGES ACCESSIBLE BY UNAUTHORIZED USERS VIA URL GUESSING OR NETWORK SNIFFING
[patent_app_type] => utility
[patent_app_number] => 15/995823
[patent_app_country] => US
[patent_app_date] => 2018-06-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7589
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 242
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15995823
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/995823 | Identifying webpages accessible by unauthorized users via URL guessing or network sniffing | May 31, 2018 | Issued |
Array
(
[id] => 16419003
[patent_doc_number] => 10826917
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-03
[patent_title] => Malicious data scan service
[patent_app_type] => utility
[patent_app_number] => 15/969580
[patent_app_country] => US
[patent_app_date] => 2018-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 11459
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 181
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15969580
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/969580 | Malicious data scan service | May 1, 2018 | Issued |
Array
(
[id] => 13390683
[patent_doc_number] => 20180246884
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-08-30
[patent_title] => ENTERPRISE-LEVEL DATA PROTECTION WITH VARIABLE DATA GRANULARITY AND DATA DISCLOSURE CONTROL WITH HIERARCHICAL SUMMARIZATION, TOPICAL STRUCTURING, AND TRAVERSAL AUDIT
[patent_app_type] => utility
[patent_app_number] => 15/965877
[patent_app_country] => US
[patent_app_date] => 2018-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11340
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15965877
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/965877 | Enterprise-level data protection with variable data granularity and data disclosure control with hierarchical summarization, topical structuring, and traversal audit | Apr 27, 2018 | Issued |
Array
(
[id] => 14890655
[patent_doc_number] => 10425387
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-24
[patent_title] => Credentials enforcement using a firewall
[patent_app_type] => utility
[patent_app_number] => 15/945129
[patent_app_country] => US
[patent_app_date] => 2018-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 17722
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15945129
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/945129 | Credentials enforcement using a firewall | Apr 3, 2018 | Issued |
Array
(
[id] => 15505843
[patent_doc_number] => 20200053110
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-13
[patent_title] => METHOD OF DETECTING ABNORMAL BEHAVIOR OF USER OF COMPUTER NETWORK SYSTEM
[patent_app_type] => utility
[patent_app_number] => 16/498910
[patent_app_country] => US
[patent_app_date] => 2018-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5440
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16498910
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/498910 | METHOD OF DETECTING ABNORMAL BEHAVIOR OF USER OF COMPUTER NETWORK SYSTEM | Mar 25, 2018 | Abandoned |
Array
(
[id] => 14845303
[patent_doc_number] => 20190281052
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-12
[patent_title] => SYSTEMS AND METHODS FOR SECURING AN AUTOMOTIVE CONTROLLER NETWORK
[patent_app_type] => utility
[patent_app_number] => 15/916059
[patent_app_country] => US
[patent_app_date] => 2018-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 18286
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -19
[patent_words_short_claim] => 297
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15916059
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/916059 | SYSTEMS AND METHODS FOR SECURING AN AUTOMOTIVE CONTROLLER NETWORK | Mar 7, 2018 | Abandoned |
Array
(
[id] => 17151600
[patent_doc_number] => 11144678
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-10-12
[patent_title] => System with secure SoC connections among IP and multiple GPIOs, and corresponding method
[patent_app_type] => utility
[patent_app_number] => 15/916067
[patent_app_country] => US
[patent_app_date] => 2018-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 10
[patent_no_of_words] => 6219
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 326
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15916067
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/916067 | System with secure SoC connections among IP and multiple GPIOs, and corresponding method | Mar 7, 2018 | Issued |
Array
(
[id] => 13418023
[patent_doc_number] => 20180260554
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-09-13
[patent_title] => PORTABLE KEYS FOR MANAGING ACCESS TO MOBILE DEVICES
[patent_app_type] => utility
[patent_app_number] => 15/916246
[patent_app_country] => US
[patent_app_date] => 2018-03-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13371
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 101
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15916246
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/916246 | Portable keys for managing access to mobile devices | Mar 7, 2018 | Issued |
Array
(
[id] => 16846995
[patent_doc_number] => 11019107
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-05-25
[patent_title] => Systems and methods for identifying violation conditions from electronic communications
[patent_app_type] => utility
[patent_app_number] => 15/899155
[patent_app_country] => US
[patent_app_date] => 2018-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 14075
[patent_no_of_claims] => 53
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 300
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15899155
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/899155 | Systems and methods for identifying violation conditions from electronic communications | Feb 18, 2018 | Issued |
Array
(
[id] => 13993155
[patent_doc_number] => 20190065735
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => Information processing apparatus, information processing method, and computer program product
[patent_app_type] => utility
[patent_app_number] => 15/932182
[patent_app_country] => US
[patent_app_date] => 2018-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 17739
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15932182
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/932182 | Information processing apparatus, information processing method, and computer program product | Feb 15, 2018 | Issued |
Array
(
[id] => 16496843
[patent_doc_number] => 10862906
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-12-08
[patent_title] => Playbook based data collection to identify cyber security threats
[patent_app_type] => utility
[patent_app_number] => 15/932229
[patent_app_country] => US
[patent_app_date] => 2018-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 11161
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15932229
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/932229 | Playbook based data collection to identify cyber security threats | Feb 15, 2018 | Issued |
Array
(
[id] => 14751251
[patent_doc_number] => 20190258799
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-22
[patent_title] => SYSTEM AND METHOD FOR MONITORING EFFECTIVE CONTROL OF A MACHINE
[patent_app_type] => utility
[patent_app_number] => 15/898359
[patent_app_country] => US
[patent_app_date] => 2018-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10034
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15898359
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/898359 | System and method for monitoring effective control of a machine | Feb 15, 2018 | Issued |
Array
(
[id] => 14755133
[patent_doc_number] => 20190260740
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-22
[patent_title] => System, Method, and Apparatus for Data Access Security
[patent_app_type] => utility
[patent_app_number] => 15/898376
[patent_app_country] => US
[patent_app_date] => 2018-02-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4686
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15898376
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/898376 | System, Method, and Apparatus for Data Access Security | Feb 15, 2018 | Abandoned |
Array
(
[id] => 13998405
[patent_doc_number] => 20190068360
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => SYSTEM AND METHOD FOR DETECTING ANOMALIES IN EXAMINATIONS
[patent_app_type] => utility
[patent_app_number] => 15/859520
[patent_app_country] => US
[patent_app_date] => 2017-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10289
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -7
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15859520
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/859520 | System and method for detecting anomalies in examinations | Dec 30, 2017 | Issued |
Array
(
[id] => 15908651
[patent_doc_number] => 20200153847
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-14
[patent_title] => DATA BREACH PROTECTION
[patent_app_type] => utility
[patent_app_number] => 16/473853
[patent_app_country] => US
[patent_app_date] => 2017-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4054
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -5
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16473853
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/473853 | Data breach protection | Dec 18, 2017 | Issued |
Array
(
[id] => 13807531
[patent_doc_number] => 10181032
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-01-15
[patent_title] => System and methods for digital account threat detection
[patent_app_type] => utility
[patent_app_number] => 15/842379
[patent_app_country] => US
[patent_app_date] => 2017-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8571
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15842379
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/842379 | System and methods for digital account threat detection | Dec 13, 2017 | Issued |
Array
(
[id] => 15478423
[patent_doc_number] => 10555112
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-02-04
[patent_title] => Systems and methods for providing location-based security and/or privacy for restricting user access
[patent_app_type] => utility
[patent_app_number] => 15/840775
[patent_app_country] => US
[patent_app_date] => 2017-12-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 35
[patent_figures_cnt] => 21
[patent_no_of_words] => 35177
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15840775
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/840775 | Systems and methods for providing location-based security and/or privacy for restricting user access | Dec 12, 2017 | Issued |