Search

Christopher J. Brown

Examiner (ID: 10584)

Most Active Art Unit
2439
Art Unit(s)
2134, 2439, 2434
Total Applications
972
Issued Applications
641
Pending Applications
123
Abandoned Applications
224

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 18174362 [patent_doc_number] => 11574074 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-02-07 [patent_title] => Systems and methods for identifying content types for data loss prevention [patent_app_type] => utility [patent_app_number] => 15/837168 [patent_app_country] => US [patent_app_date] => 2017-12-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 17125 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 407 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15837168 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/837168
Systems and methods for identifying content types for data loss prevention Dec 10, 2017 Issued
Array ( [id] => 18841223 [patent_doc_number] => 11849316 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-12-19 [patent_title] => Methods, apparatuses, computer programs and carriers for security management before handover from 5G to 4G system [patent_app_type] => utility [patent_app_number] => 16/481751 [patent_app_country] => US [patent_app_date] => 2017-12-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 18 [patent_no_of_words] => 17064 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 99 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16481751 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/481751
Methods, apparatuses, computer programs and carriers for security management before handover from 5G to 4G system Dec 5, 2017 Issued
Array ( [id] => 14353091 [patent_doc_number] => 20190158519 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-05-23 [patent_title] => DETECTING COMPROMISED SOCIAL MEDIA ACCOUNTS BY ANALYZING AFFINITY GROUPS [patent_app_type] => utility [patent_app_number] => 15/819520 [patent_app_country] => US [patent_app_date] => 2017-11-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10246 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 118 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15819520 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/819520
Detecting compromised social media accounts by analyzing affinity groups Nov 20, 2017 Issued
Array ( [id] => 15002721 [patent_doc_number] => 20190320318 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-10-17 [patent_title] => HANDLING RADIO LINK FAILURE IN A NARROW BANDWIDTH INTERNET OF THINGS CONTROL PLANE [patent_app_type] => utility [patent_app_number] => 16/347660 [patent_app_country] => US [patent_app_date] => 2017-11-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8407 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -15 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16347660 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/347660
Handling radio link failure in a narrow bandwidth internet of things control plane Nov 1, 2017 Issued
Array ( [id] => 15643415 [patent_doc_number] => 10594729 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-17 [patent_title] => Dynamically configuring a honeypot [patent_app_type] => utility [patent_app_number] => 15/799647 [patent_app_country] => US [patent_app_date] => 2017-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 8243 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 164 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15799647 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/799647
Dynamically configuring a honeypot Oct 30, 2017 Issued
Array ( [id] => 12742180 [patent_doc_number] => 20180139227 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-05-17 [patent_title] => METHOD FOR PREDICTING SECURITY RISKS OF ASSETS ON A COMPUTER NETWORK [patent_app_type] => utility [patent_app_number] => 15/799827 [patent_app_country] => US [patent_app_date] => 2017-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13323 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 170 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15799827 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/799827
Method for predicting security risks of assets on a computer network Oct 30, 2017 Issued
Array ( [id] => 16685278 [patent_doc_number] => 10944778 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-03-09 [patent_title] => Method and system for implementing risk based cyber security [patent_app_type] => utility [patent_app_number] => 15/795967 [patent_app_country] => US [patent_app_date] => 2017-10-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 12 [patent_no_of_words] => 11697 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 172 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15795967 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/795967
Method and system for implementing risk based cyber security Oct 26, 2017 Issued
Array ( [id] => 13767945 [patent_doc_number] => 10176318 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-01-08 [patent_title] => Authentication information update based on fraud detection [patent_app_type] => utility [patent_app_number] => 15/795812 [patent_app_country] => US [patent_app_date] => 2017-10-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 24283 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 200 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15795812 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/795812
Authentication information update based on fraud detection Oct 26, 2017 Issued
Array ( [id] => 14811511 [patent_doc_number] => 20190272365 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-09-05 [patent_title] => ELECTRONIC DEVICE AND METHOD FOR PERFORMING AUTHENTICATION [patent_app_type] => utility [patent_app_number] => 16/344963 [patent_app_country] => US [patent_app_date] => 2017-10-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13704 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 47 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16344963 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/344963
Electronic device and method for performing authentication Oct 25, 2017 Issued
Array ( [id] => 14223443 [patent_doc_number] => 20190124107 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-04-25 [patent_title] => SECURITY MANAGEMENT FOR DATA SYSTEMS [patent_app_type] => utility [patent_app_number] => 15/789529 [patent_app_country] => US [patent_app_date] => 2017-10-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8837 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 84 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15789529 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/789529
Security management for data systems Oct 19, 2017 Issued
Array ( [id] => 14224243 [patent_doc_number] => 20190124507 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-04-25 [patent_title] => SINGLE SIGN-IN FOR IOT DEVICES [patent_app_type] => utility [patent_app_number] => 15/788768 [patent_app_country] => US [patent_app_date] => 2017-10-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9292 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 46 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15788768 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/788768
Single sign-in for IoT devices Oct 18, 2017 Issued
Array ( [id] => 15643305 [patent_doc_number] => 10594674 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-03-17 [patent_title] => User authentication based on probabilistic inference of threat source [patent_app_type] => utility [patent_app_number] => 15/727728 [patent_app_country] => US [patent_app_date] => 2017-10-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 15 [patent_no_of_words] => 15387 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 225 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15727728 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/727728
User authentication based on probabilistic inference of threat source Oct 8, 2017 Issued
Array ( [id] => 12264574 [patent_doc_number] => 20180083770 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-22 [patent_title] => 'DETECTING ENCODING ATTACK' [patent_app_type] => utility [patent_app_number] => 15/710049 [patent_app_country] => US [patent_app_date] => 2017-09-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4865 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15710049 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/710049
DETECTING ENCODING ATTACK Sep 19, 2017 Abandoned
Array ( [id] => 12264572 [patent_doc_number] => 20180083769 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-03-22 [patent_title] => 'ENCRYPTION/DESCRIPTION METHOD PROTECTED AGAINST SIDE-CHANNEL ATTACKS' [patent_app_type] => utility [patent_app_number] => 15/709982 [patent_app_country] => US [patent_app_date] => 2017-09-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4226 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15709982 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/709982
Encryption/description method protected against side-channel attacks Sep 19, 2017 Issued
Array ( [id] => 15705637 [patent_doc_number] => 10609013 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-31 [patent_title] => Twin factor authentication for controller [patent_app_type] => utility [patent_app_number] => 15/709683 [patent_app_country] => US [patent_app_date] => 2017-09-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5413 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 200 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15709683 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/709683
Twin factor authentication for controller Sep 19, 2017 Issued
Array ( [id] => 14081719 [patent_doc_number] => 20190089747 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-03-21 [patent_title] => PROTECTING SECURE SESSION FROM IOT GATEWAYS [patent_app_type] => utility [patent_app_number] => 15/708453 [patent_app_country] => US [patent_app_date] => 2017-09-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7312 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 86 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15708453 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/708453
PROTECTING SECURE SESSION FROM IOT GATEWAYS Sep 18, 2017 Abandoned
Array ( [id] => 16882154 [patent_doc_number] => 11032320 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2021-06-08 [patent_title] => Systems and methods for dynamic application level encryption [patent_app_type] => utility [patent_app_number] => 15/708534 [patent_app_country] => US [patent_app_date] => 2017-09-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6267 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 209 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15708534 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/708534
Systems and methods for dynamic application level encryption Sep 18, 2017 Issued
Array ( [id] => 16018407 [patent_doc_number] => 20200184047 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-06-11 [patent_title] => AUTHENTICATE A FIRST AND SECOND USER [patent_app_type] => utility [patent_app_number] => 16/605198 [patent_app_country] => US [patent_app_date] => 2017-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3632 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -12 [patent_words_short_claim] => 53 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16605198 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/605198
AUTHENTICATE A FIRST AND SECOND USER Aug 27, 2017 Abandoned
Array ( [id] => 13998403 [patent_doc_number] => 20190068359 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-02-28 [patent_title] => SYSTEM AND METHOD FOR DETECTING ANOMALIES IN EXAMINATIONS [patent_app_type] => utility [patent_app_number] => 15/685744 [patent_app_country] => US [patent_app_date] => 2017-08-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10239 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -10 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15685744 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/685744
System and method for detecting anomalies in examinations Aug 23, 2017 Issued
Array ( [id] => 12992998 [patent_doc_number] => 20170346806 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-11-30 [patent_title] => IMAGE BASED KEY DERIVATION FUNCTION [patent_app_type] => utility [patent_app_number] => 15/677377 [patent_app_country] => US [patent_app_date] => 2017-08-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9521 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 144 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15677377 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/677377
Image based key deprivation function Aug 14, 2017 Issued
Menu