
Christopher J. Brown
Examiner (ID: 10584)
| Most Active Art Unit | 2439 |
| Art Unit(s) | 2134, 2439, 2434 |
| Total Applications | 972 |
| Issued Applications | 641 |
| Pending Applications | 123 |
| Abandoned Applications | 224 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11982669
[patent_doc_number] => 20170286823
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-05
[patent_title] => 'ELECTRONIC CERTIFICATE AND DISPLAY METHOD THEREFOR'
[patent_app_type] => utility
[patent_app_number] => 15/510822
[patent_app_country] => US
[patent_app_date] => 2016-03-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3633
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15510822
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/510822 | ELECTRONIC CERTIFICATE AND DISPLAY METHOD THEREFOR | Mar 15, 2016 | Abandoned |
Array
(
[id] => 10994287
[patent_doc_number] => 20160191233
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-30
[patent_title] => 'MANAGED SECURE COMPUTATIONS ON ENCRYPTED DATA'
[patent_app_type] => utility
[patent_app_number] => 15/062597
[patent_app_country] => US
[patent_app_date] => 2016-03-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9282
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15062597
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/062597 | Managed secure computations on encrypted data | Mar 6, 2016 | Issued |
Array
(
[id] => 11329806
[patent_doc_number] => 20160360418
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-08
[patent_title] => 'UNAUTHORIZED BEACON DETECTION'
[patent_app_type] => utility
[patent_app_number] => 15/055665
[patent_app_country] => US
[patent_app_date] => 2016-02-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4594
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15055665
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/055665 | UNAUTHORIZED BEACON DETECTION | Feb 28, 2016 | Abandoned |
Array
(
[id] => 12251134
[patent_doc_number] => 09923931
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-03-20
[patent_title] => 'Systems and methods for identifying violation conditions from electronic communications'
[patent_app_type] => utility
[patent_app_number] => 15/017388
[patent_app_country] => US
[patent_app_date] => 2016-02-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 14287
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 318
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15017388
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/017388 | Systems and methods for identifying violation conditions from electronic communications | Feb 4, 2016 | Issued |
Array
(
[id] => 14269895
[patent_doc_number] => 10284527
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-07
[patent_title] => Systems and methods for secured communications
[patent_app_type] => utility
[patent_app_number] => 15/013570
[patent_app_country] => US
[patent_app_date] => 2016-02-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 38
[patent_figures_cnt] => 38
[patent_no_of_words] => 15331
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 385
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15013570
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/013570 | Systems and methods for secured communications | Feb 1, 2016 | Issued |
Array
(
[id] => 14270037
[patent_doc_number] => 10284598
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-07
[patent_title] => Honeypot network services
[patent_app_type] => utility
[patent_app_number] => 15/010783
[patent_app_country] => US
[patent_app_date] => 2016-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 21902
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 236
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15010783
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/010783 | Honeypot network services | Jan 28, 2016 | Issued |
Array
(
[id] => 13045143
[patent_doc_number] => 10044719
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-07
[patent_title] => Client application based access control in cloud security systems for mobile devices
[patent_app_type] => utility
[patent_app_number] => 15/009966
[patent_app_country] => US
[patent_app_date] => 2016-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 12398
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15009966
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/009966 | Client application based access control in cloud security systems for mobile devices | Jan 28, 2016 | Issued |
Array
(
[id] => 11841308
[patent_doc_number] => 20170223029
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-03
[patent_title] => 'CONTENT DELIVERY NETWORK PROTECTION FROM MALWARE AND DATA LEAKAGE'
[patent_app_type] => utility
[patent_app_number] => 15/010441
[patent_app_country] => US
[patent_app_date] => 2016-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 13117
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15010441
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/010441 | Content delivery network protection from malware and data leakage | Jan 28, 2016 | Issued |
Array
(
[id] => 11015188
[patent_doc_number] => 20160212141
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-21
[patent_title] => 'INVISIBLE PASSWORD RESET PROTOCOL'
[patent_app_type] => utility
[patent_app_number] => 15/003413
[patent_app_country] => US
[patent_app_date] => 2016-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 10383
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15003413
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/003413 | Invisible password reset protocol | Jan 20, 2016 | Issued |
Array
(
[id] => 13274141
[patent_doc_number] => 10149166
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-04
[patent_title] => Verifying a certificate
[patent_app_type] => utility
[patent_app_number] => 14/995932
[patent_app_country] => US
[patent_app_date] => 2016-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4286
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14995932
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/995932 | Verifying a certificate | Jan 13, 2016 | Issued |
Array
(
[id] => 11006386
[patent_doc_number] => 20160203336
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-14
[patent_title] => 'System, Apparatus and Method for Anonymizing Data Prior to Threat Detection Analysis'
[patent_app_type] => utility
[patent_app_number] => 14/994954
[patent_app_country] => US
[patent_app_date] => 2016-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8364
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14994954
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/994954 | System, apparatus and method for anonymizing data prior to threat detection analysis | Jan 12, 2016 | Issued |
Array
(
[id] => 15639413
[patent_doc_number] => 10592700
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-17
[patent_title] => Securing electronic property from unauthorized use
[patent_app_type] => utility
[patent_app_number] => 14/992613
[patent_app_country] => US
[patent_app_date] => 2016-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 6668
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 260
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14992613
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/992613 | Securing electronic property from unauthorized use | Jan 10, 2016 | Issued |
Array
(
[id] => 15373973
[patent_doc_number] => 10528707
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-01-07
[patent_title] => Enabling content protection over broadcast channels
[patent_app_type] => utility
[patent_app_number] => 14/992990
[patent_app_country] => US
[patent_app_date] => 2016-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 5362
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14992990
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/992990 | Enabling content protection over broadcast channels | Jan 10, 2016 | Issued |
Array
(
[id] => 12020680
[patent_doc_number] => 09813402
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-11-07
[patent_title] => 'User authentication based on probabilistic inference of threat source'
[patent_app_type] => utility
[patent_app_number] => 14/991042
[patent_app_country] => US
[patent_app_date] => 2016-01-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 15969
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14991042
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/991042 | User authentication based on probabilistic inference of threat source | Jan 7, 2016 | Issued |
Array
(
[id] => 14432005
[patent_doc_number] => 10320824
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-06-11
[patent_title] => Anomaly detection using network traffic data
[patent_app_type] => utility
[patent_app_number] => 14/989920
[patent_app_country] => US
[patent_app_date] => 2016-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7897
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 198
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14989920
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/989920 | Anomaly detection using network traffic data | Jan 6, 2016 | Issued |
Array
(
[id] => 13190131
[patent_doc_number] => 10110608
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-23
[patent_title] => Authorizing transaction on a shared device using a personal device
[patent_app_type] => utility
[patent_app_number] => 14/990717
[patent_app_country] => US
[patent_app_date] => 2016-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 10375
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 314
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14990717
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/990717 | Authorizing transaction on a shared device using a personal device | Jan 6, 2016 | Issued |
Array
(
[id] => 10773174
[patent_doc_number] => 20160119330
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'SMART ROUTER WITH ENHANCED SECURITY'
[patent_app_type] => utility
[patent_app_number] => 14/990018
[patent_app_country] => US
[patent_app_date] => 2016-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 41
[patent_figures_cnt] => 41
[patent_no_of_words] => 18546
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14990018
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/990018 | SMART ROUTER WITH ENHANCED SECURITY | Jan 6, 2016 | Abandoned |
Array
(
[id] => 11051827
[patent_doc_number] => 20160248788
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-25
[patent_title] => 'MONITORING APPARATUS AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/989484
[patent_app_country] => US
[patent_app_date] => 2016-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 12195
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14989484
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/989484 | Monitoring apparatus and method | Jan 5, 2016 | Issued |
Array
(
[id] => 12230587
[patent_doc_number] => 09917843
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-03-13
[patent_title] => 'Secure data management techniques'
[patent_app_type] => utility
[patent_app_number] => 14/989294
[patent_app_country] => US
[patent_app_date] => 2016-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 14678
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 244
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14989294
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/989294 | Secure data management techniques | Jan 5, 2016 | Issued |
Array
(
[id] => 11000962
[patent_doc_number] => 20160197909
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-07
[patent_title] => 'Securing Network Activity Managed by Operating Systems'
[patent_app_type] => utility
[patent_app_number] => 14/986971
[patent_app_country] => US
[patent_app_date] => 2016-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 17288
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14986971
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/986971 | Securing network activity managed by operating systems | Jan 3, 2016 | Issued |