
Christopher J. Brown
Examiner (ID: 10584)
| Most Active Art Unit | 2439 |
| Art Unit(s) | 2134, 2439, 2434 |
| Total Applications | 972 |
| Issued Applications | 641 |
| Pending Applications | 123 |
| Abandoned Applications | 224 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 18174362
[patent_doc_number] => 11574074
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-02-07
[patent_title] => Systems and methods for identifying content types for data loss prevention
[patent_app_type] => utility
[patent_app_number] => 15/837168
[patent_app_country] => US
[patent_app_date] => 2017-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 17125
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 407
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15837168
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/837168 | Systems and methods for identifying content types for data loss prevention | Dec 10, 2017 | Issued |
Array
(
[id] => 18841223
[patent_doc_number] => 11849316
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-12-19
[patent_title] => Methods, apparatuses, computer programs and carriers for security management before handover from 5G to 4G system
[patent_app_type] => utility
[patent_app_number] => 16/481751
[patent_app_country] => US
[patent_app_date] => 2017-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 18
[patent_no_of_words] => 17064
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16481751
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/481751 | Methods, apparatuses, computer programs and carriers for security management before handover from 5G to 4G system | Dec 5, 2017 | Issued |
Array
(
[id] => 14353091
[patent_doc_number] => 20190158519
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-05-23
[patent_title] => DETECTING COMPROMISED SOCIAL MEDIA ACCOUNTS BY ANALYZING AFFINITY GROUPS
[patent_app_type] => utility
[patent_app_number] => 15/819520
[patent_app_country] => US
[patent_app_date] => 2017-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10246
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15819520
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/819520 | Detecting compromised social media accounts by analyzing affinity groups | Nov 20, 2017 | Issued |
Array
(
[id] => 15002721
[patent_doc_number] => 20190320318
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-17
[patent_title] => HANDLING RADIO LINK FAILURE IN A NARROW BANDWIDTH INTERNET OF THINGS CONTROL PLANE
[patent_app_type] => utility
[patent_app_number] => 16/347660
[patent_app_country] => US
[patent_app_date] => 2017-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8407
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16347660
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/347660 | Handling radio link failure in a narrow bandwidth internet of things control plane | Nov 1, 2017 | Issued |
Array
(
[id] => 15643415
[patent_doc_number] => 10594729
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-17
[patent_title] => Dynamically configuring a honeypot
[patent_app_type] => utility
[patent_app_number] => 15/799647
[patent_app_country] => US
[patent_app_date] => 2017-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8243
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15799647
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/799647 | Dynamically configuring a honeypot | Oct 30, 2017 | Issued |
Array
(
[id] => 12742180
[patent_doc_number] => 20180139227
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-05-17
[patent_title] => METHOD FOR PREDICTING SECURITY RISKS OF ASSETS ON A COMPUTER NETWORK
[patent_app_type] => utility
[patent_app_number] => 15/799827
[patent_app_country] => US
[patent_app_date] => 2017-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13323
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15799827
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/799827 | Method for predicting security risks of assets on a computer network | Oct 30, 2017 | Issued |
Array
(
[id] => 16685278
[patent_doc_number] => 10944778
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-03-09
[patent_title] => Method and system for implementing risk based cyber security
[patent_app_type] => utility
[patent_app_number] => 15/795967
[patent_app_country] => US
[patent_app_date] => 2017-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 12
[patent_no_of_words] => 11697
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15795967
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/795967 | Method and system for implementing risk based cyber security | Oct 26, 2017 | Issued |
Array
(
[id] => 13767945
[patent_doc_number] => 10176318
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-01-08
[patent_title] => Authentication information update based on fraud detection
[patent_app_type] => utility
[patent_app_number] => 15/795812
[patent_app_country] => US
[patent_app_date] => 2017-10-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 24283
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15795812
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/795812 | Authentication information update based on fraud detection | Oct 26, 2017 | Issued |
Array
(
[id] => 14811511
[patent_doc_number] => 20190272365
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-05
[patent_title] => ELECTRONIC DEVICE AND METHOD FOR PERFORMING AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 16/344963
[patent_app_country] => US
[patent_app_date] => 2017-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13704
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 47
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16344963
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/344963 | Electronic device and method for performing authentication | Oct 25, 2017 | Issued |
Array
(
[id] => 14223443
[patent_doc_number] => 20190124107
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-25
[patent_title] => SECURITY MANAGEMENT FOR DATA SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 15/789529
[patent_app_country] => US
[patent_app_date] => 2017-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8837
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15789529
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/789529 | Security management for data systems | Oct 19, 2017 | Issued |
Array
(
[id] => 14224243
[patent_doc_number] => 20190124507
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-04-25
[patent_title] => SINGLE SIGN-IN FOR IOT DEVICES
[patent_app_type] => utility
[patent_app_number] => 15/788768
[patent_app_country] => US
[patent_app_date] => 2017-10-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9292
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 46
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15788768
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/788768 | Single sign-in for IoT devices | Oct 18, 2017 | Issued |
Array
(
[id] => 15643305
[patent_doc_number] => 10594674
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-17
[patent_title] => User authentication based on probabilistic inference of threat source
[patent_app_type] => utility
[patent_app_number] => 15/727728
[patent_app_country] => US
[patent_app_date] => 2017-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 15387
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15727728
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/727728 | User authentication based on probabilistic inference of threat source | Oct 8, 2017 | Issued |
Array
(
[id] => 12264574
[patent_doc_number] => 20180083770
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-22
[patent_title] => 'DETECTING ENCODING ATTACK'
[patent_app_type] => utility
[patent_app_number] => 15/710049
[patent_app_country] => US
[patent_app_date] => 2017-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4865
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15710049
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/710049 | DETECTING ENCODING ATTACK | Sep 19, 2017 | Abandoned |
Array
(
[id] => 12264572
[patent_doc_number] => 20180083769
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-22
[patent_title] => 'ENCRYPTION/DESCRIPTION METHOD PROTECTED AGAINST SIDE-CHANNEL ATTACKS'
[patent_app_type] => utility
[patent_app_number] => 15/709982
[patent_app_country] => US
[patent_app_date] => 2017-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4226
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15709982
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/709982 | Encryption/description method protected against side-channel attacks | Sep 19, 2017 | Issued |
Array
(
[id] => 15705637
[patent_doc_number] => 10609013
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-31
[patent_title] => Twin factor authentication for controller
[patent_app_type] => utility
[patent_app_number] => 15/709683
[patent_app_country] => US
[patent_app_date] => 2017-09-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5413
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15709683
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/709683 | Twin factor authentication for controller | Sep 19, 2017 | Issued |
Array
(
[id] => 14081719
[patent_doc_number] => 20190089747
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-03-21
[patent_title] => PROTECTING SECURE SESSION FROM IOT GATEWAYS
[patent_app_type] => utility
[patent_app_number] => 15/708453
[patent_app_country] => US
[patent_app_date] => 2017-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7312
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 86
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15708453
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/708453 | PROTECTING SECURE SESSION FROM IOT GATEWAYS | Sep 18, 2017 | Abandoned |
Array
(
[id] => 16882154
[patent_doc_number] => 11032320
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-06-08
[patent_title] => Systems and methods for dynamic application level encryption
[patent_app_type] => utility
[patent_app_number] => 15/708534
[patent_app_country] => US
[patent_app_date] => 2017-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6267
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 209
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15708534
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/708534 | Systems and methods for dynamic application level encryption | Sep 18, 2017 | Issued |
Array
(
[id] => 16018407
[patent_doc_number] => 20200184047
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-11
[patent_title] => AUTHENTICATE A FIRST AND SECOND USER
[patent_app_type] => utility
[patent_app_number] => 16/605198
[patent_app_country] => US
[patent_app_date] => 2017-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3632
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 53
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16605198
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/605198 | AUTHENTICATE A FIRST AND SECOND USER | Aug 27, 2017 | Abandoned |
Array
(
[id] => 13998403
[patent_doc_number] => 20190068359
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-02-28
[patent_title] => SYSTEM AND METHOD FOR DETECTING ANOMALIES IN EXAMINATIONS
[patent_app_type] => utility
[patent_app_number] => 15/685744
[patent_app_country] => US
[patent_app_date] => 2017-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10239
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -10
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15685744
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/685744 | System and method for detecting anomalies in examinations | Aug 23, 2017 | Issued |
Array
(
[id] => 12992998
[patent_doc_number] => 20170346806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-30
[patent_title] => IMAGE BASED KEY DERIVATION FUNCTION
[patent_app_type] => utility
[patent_app_number] => 15/677377
[patent_app_country] => US
[patent_app_date] => 2017-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9521
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15677377
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/677377 | Image based key deprivation function | Aug 14, 2017 | Issued |