Search

Christopher J. Brown

Examiner (ID: 10584)

Most Active Art Unit
2439
Art Unit(s)
2134, 2439, 2434
Total Applications
972
Issued Applications
641
Pending Applications
123
Abandoned Applications
224

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 15705589 [patent_doc_number] => 10608989 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-31 [patent_title] => Real time dynamic client access control [patent_app_type] => utility [patent_app_number] => 16/027537 [patent_app_country] => US [patent_app_date] => 2018-07-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 11950 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 394 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16027537 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/027537
Real time dynamic client access control Jul 4, 2018 Issued
Array ( [id] => 16173952 [patent_doc_number] => 10715540 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-07-14 [patent_title] => Protection from malicious and/or harmful content in cloud-based service scenarios [patent_app_type] => utility [patent_app_number] => 16/019786 [patent_app_country] => US [patent_app_date] => 2018-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7492 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 268 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16019786 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/019786
Protection from malicious and/or harmful content in cloud-based service scenarios Jun 26, 2018 Issued
Array ( [id] => 13907179 [patent_doc_number] => 20190042794 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-07 [patent_title] => SYSTEMS AND METHODS FOR AUTHENTICATING AND PROTECTING THE INTEGRITY OF DATA STREAMS AND OTHER DATA [patent_app_type] => utility [patent_app_number] => 16/010004 [patent_app_country] => US [patent_app_date] => 2018-06-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11359 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16010004 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/010004
SYSTEMS AND METHODS FOR AUTHENTICATING AND PROTECTING THE INTEGRITY OF DATA STREAMS AND OTHER DATA Jun 14, 2018 Abandoned
Array ( [id] => 13449529 [patent_doc_number] => 20180276307 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-09-27 [patent_title] => IDENTIFYING WEBPAGES ACCESSIBLE BY UNAUTHORIZED USERS VIA URL GUESSING OR NETWORK SNIFFING [patent_app_type] => utility [patent_app_number] => 15/995823 [patent_app_country] => US [patent_app_date] => 2018-06-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7589 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 242 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15995823 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/995823
Identifying webpages accessible by unauthorized users via URL guessing or network sniffing May 31, 2018 Issued
Array ( [id] => 16419003 [patent_doc_number] => 10826917 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-11-03 [patent_title] => Malicious data scan service [patent_app_type] => utility [patent_app_number] => 15/969580 [patent_app_country] => US [patent_app_date] => 2018-05-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 12 [patent_no_of_words] => 11459 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 181 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15969580 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/969580
Malicious data scan service May 1, 2018 Issued
Array ( [id] => 13390683 [patent_doc_number] => 20180246884 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-08-30 [patent_title] => ENTERPRISE-LEVEL DATA PROTECTION WITH VARIABLE DATA GRANULARITY AND DATA DISCLOSURE CONTROL WITH HIERARCHICAL SUMMARIZATION, TOPICAL STRUCTURING, AND TRAVERSAL AUDIT [patent_app_type] => utility [patent_app_number] => 15/965877 [patent_app_country] => US [patent_app_date] => 2018-04-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11340 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -9 [patent_words_short_claim] => 156 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15965877 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/965877
Enterprise-level data protection with variable data granularity and data disclosure control with hierarchical summarization, topical structuring, and traversal audit Apr 27, 2018 Issued
Array ( [id] => 14890655 [patent_doc_number] => 10425387 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-09-24 [patent_title] => Credentials enforcement using a firewall [patent_app_type] => utility [patent_app_number] => 15/945129 [patent_app_country] => US [patent_app_date] => 2018-04-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 15 [patent_no_of_words] => 17722 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 229 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15945129 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/945129
Credentials enforcement using a firewall Apr 3, 2018 Issued
Array ( [id] => 15505843 [patent_doc_number] => 20200053110 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-02-13 [patent_title] => METHOD OF DETECTING ABNORMAL BEHAVIOR OF USER OF COMPUTER NETWORK SYSTEM [patent_app_type] => utility [patent_app_number] => 16/498910 [patent_app_country] => US [patent_app_date] => 2018-03-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5440 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -19 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16498910 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/498910
METHOD OF DETECTING ABNORMAL BEHAVIOR OF USER OF COMPUTER NETWORK SYSTEM Mar 25, 2018 Abandoned
Array ( [id] => 14845303 [patent_doc_number] => 20190281052 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-09-12 [patent_title] => SYSTEMS AND METHODS FOR SECURING AN AUTOMOTIVE CONTROLLER NETWORK [patent_app_type] => utility [patent_app_number] => 15/916059 [patent_app_country] => US [patent_app_date] => 2018-03-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 18286 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -19 [patent_words_short_claim] => 297 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15916059 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/916059
SYSTEMS AND METHODS FOR SECURING AN AUTOMOTIVE CONTROLLER NETWORK Mar 7, 2018 Abandoned
Array ( [id] => 17151600 [patent_doc_number] => 11144678 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2021-10-12 [patent_title] => System with secure SoC connections among IP and multiple GPIOs, and corresponding method [patent_app_type] => utility [patent_app_number] => 15/916067 [patent_app_country] => US [patent_app_date] => 2018-03-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 10 [patent_no_of_words] => 6219 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 326 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15916067 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/916067
System with secure SoC connections among IP and multiple GPIOs, and corresponding method Mar 7, 2018 Issued
Array ( [id] => 13418023 [patent_doc_number] => 20180260554 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-09-13 [patent_title] => PORTABLE KEYS FOR MANAGING ACCESS TO MOBILE DEVICES [patent_app_type] => utility [patent_app_number] => 15/916246 [patent_app_country] => US [patent_app_date] => 2018-03-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13371 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 101 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15916246 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/916246
Portable keys for managing access to mobile devices Mar 7, 2018 Issued
Array ( [id] => 16846995 [patent_doc_number] => 11019107 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-05-25 [patent_title] => Systems and methods for identifying violation conditions from electronic communications [patent_app_type] => utility [patent_app_number] => 15/899155 [patent_app_country] => US [patent_app_date] => 2018-02-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 14 [patent_no_of_words] => 14075 [patent_no_of_claims] => 53 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 300 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15899155 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/899155
Systems and methods for identifying violation conditions from electronic communications Feb 18, 2018 Issued
Array ( [id] => 13993155 [patent_doc_number] => 20190065735 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-28 [patent_title] => Information processing apparatus, information processing method, and computer program product [patent_app_type] => utility [patent_app_number] => 15/932182 [patent_app_country] => US [patent_app_date] => 2018-02-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 17739 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -11 [patent_words_short_claim] => 115 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15932182 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/932182
Information processing apparatus, information processing method, and computer program product Feb 15, 2018 Issued
Array ( [id] => 16496843 [patent_doc_number] => 10862906 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-12-08 [patent_title] => Playbook based data collection to identify cyber security threats [patent_app_type] => utility [patent_app_number] => 15/932229 [patent_app_country] => US [patent_app_date] => 2018-02-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 13 [patent_no_of_words] => 11161 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 192 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15932229 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/932229
Playbook based data collection to identify cyber security threats Feb 15, 2018 Issued
Array ( [id] => 14751251 [patent_doc_number] => 20190258799 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-08-22 [patent_title] => SYSTEM AND METHOD FOR MONITORING EFFECTIVE CONTROL OF A MACHINE [patent_app_type] => utility [patent_app_number] => 15/898359 [patent_app_country] => US [patent_app_date] => 2018-02-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10034 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 91 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15898359 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/898359
System and method for monitoring effective control of a machine Feb 15, 2018 Issued
Array ( [id] => 14755133 [patent_doc_number] => 20190260740 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-08-22 [patent_title] => System, Method, and Apparatus for Data Access Security [patent_app_type] => utility [patent_app_number] => 15/898376 [patent_app_country] => US [patent_app_date] => 2018-02-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4686 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 110 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15898376 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/898376
System, Method, and Apparatus for Data Access Security Feb 15, 2018 Abandoned
Array ( [id] => 13998405 [patent_doc_number] => 20190068360 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-28 [patent_title] => SYSTEM AND METHOD FOR DETECTING ANOMALIES IN EXAMINATIONS [patent_app_type] => utility [patent_app_number] => 15/859520 [patent_app_country] => US [patent_app_date] => 2017-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10289 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -7 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15859520 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/859520
System and method for detecting anomalies in examinations Dec 30, 2017 Issued
Array ( [id] => 15908651 [patent_doc_number] => 20200153847 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-05-14 [patent_title] => DATA BREACH PROTECTION [patent_app_type] => utility [patent_app_number] => 16/473853 [patent_app_country] => US [patent_app_date] => 2017-12-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4054 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -5 [patent_words_short_claim] => 86 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16473853 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/473853
Data breach protection Dec 18, 2017 Issued
Array ( [id] => 13807531 [patent_doc_number] => 10181032 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-01-15 [patent_title] => System and methods for digital account threat detection [patent_app_type] => utility [patent_app_number] => 15/842379 [patent_app_country] => US [patent_app_date] => 2017-12-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8571 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 259 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15842379 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/842379
System and methods for digital account threat detection Dec 13, 2017 Issued
Array ( [id] => 15478423 [patent_doc_number] => 10555112 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-02-04 [patent_title] => Systems and methods for providing location-based security and/or privacy for restricting user access [patent_app_type] => utility [patent_app_number] => 15/840775 [patent_app_country] => US [patent_app_date] => 2017-12-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 35 [patent_figures_cnt] => 21 [patent_no_of_words] => 35177 [patent_no_of_claims] => 36 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 226 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15840775 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/840775
Systems and methods for providing location-based security and/or privacy for restricting user access Dec 12, 2017 Issued
Menu