
Christopher J. Brown
Examiner (ID: 10584)
| Most Active Art Unit | 2439 |
| Art Unit(s) | 2134, 2439, 2434 |
| Total Applications | 972 |
| Issued Applications | 641 |
| Pending Applications | 123 |
| Abandoned Applications | 224 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15582937
[patent_doc_number] => 10581874
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-03-03
[patent_title] => Malware detection system with contextual analysis
[patent_app_type] => utility
[patent_app_number] => 14/986417
[patent_app_country] => US
[patent_app_date] => 2015-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 11030
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 221
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14986417
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/986417 | Malware detection system with contextual analysis | Dec 30, 2015 | Issued |
Array
(
[id] => 13083713
[patent_doc_number] => 10061924
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-08-28
[patent_title] => Detecting malicious code based on deviations in executable image import resolutions and load patterns
[patent_app_type] => utility
[patent_app_number] => 14/986362
[patent_app_country] => US
[patent_app_date] => 2015-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4171
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 251
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14986362
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/986362 | Detecting malicious code based on deviations in executable image import resolutions and load patterns | Dec 30, 2015 | Issued |
Array
(
[id] => 18204341
[patent_doc_number] => 11586733
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-02-21
[patent_title] => Malware detection
[patent_app_type] => utility
[patent_app_number] => 15/541089
[patent_app_country] => US
[patent_app_date] => 2015-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 4044
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 132
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15541089
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/541089 | Malware detection | Dec 16, 2015 | Issued |
Array
(
[id] => 10754163
[patent_doc_number] => 20160100315
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-07
[patent_title] => 'DETECTING AND DISABLING ROGUE ACCESS POINTS IN A NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/967532
[patent_app_country] => US
[patent_app_date] => 2015-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4340
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14967532
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/967532 | DETECTING AND DISABLING ROGUE ACCESS POINTS IN A NETWORK | Dec 13, 2015 | Abandoned |
Array
(
[id] => 10759263
[patent_doc_number] => 20160105416
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-14
[patent_title] => 'SMART ROUTER'
[patent_app_type] => utility
[patent_app_number] => 14/949862
[patent_app_country] => US
[patent_app_date] => 2015-11-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 41
[patent_figures_cnt] => 41
[patent_no_of_words] => 18512
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14949862
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/949862 | SMART ROUTER | Nov 22, 2015 | Abandoned |
Array
(
[id] => 12571824
[patent_doc_number] => 10019529
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-10
[patent_title] => Identifying webpages accessible by unauthorized users via URL guessing or network sniffing
[patent_app_type] => utility
[patent_app_number] => 14/945487
[patent_app_country] => US
[patent_app_date] => 2015-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7589
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14945487
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/945487 | Identifying webpages accessible by unauthorized users via URL guessing or network sniffing | Nov 18, 2015 | Issued |
Array
(
[id] => 13200051
[patent_doc_number] => 10114944
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-10-30
[patent_title] => Systems and methods for classifying permissions on mobile devices
[patent_app_type] => utility
[patent_app_number] => 14/938874
[patent_app_country] => US
[patent_app_date] => 2015-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10075
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 234
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14938874
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/938874 | Systems and methods for classifying permissions on mobile devices | Nov 11, 2015 | Issued |
Array
(
[id] => 11504080
[patent_doc_number] => 20170078265
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-16
[patent_title] => 'SYSTEM AND METHOD FOR SECURED PASSWORD MANAGEMENT FOR INDUSTRIAL DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/938715
[patent_app_country] => US
[patent_app_date] => 2015-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7915
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14938715
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/938715 | System and method for secured password management for industrial devices | Nov 10, 2015 | Issued |
Array
(
[id] => 12039739
[patent_doc_number] => 09817974
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-11-14
[patent_title] => 'Anti-malware program with stalling code detection'
[patent_app_type] => utility
[patent_app_number] => 14/937254
[patent_app_country] => US
[patent_app_date] => 2015-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3388
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14937254
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/937254 | Anti-malware program with stalling code detection | Nov 9, 2015 | Issued |
Array
(
[id] => 11621970
[patent_doc_number] => 20170132157
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-11
[patent_title] => 'METHOD AND APPARATUS FOR SECURING AND CONTROLLING INDIVIDUAL USER DATA'
[patent_app_type] => utility
[patent_app_number] => 14/937222
[patent_app_country] => US
[patent_app_date] => 2015-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4027
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14937222
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/937222 | Method and apparatus for securing and controlling individual user data | Nov 9, 2015 | Issued |
Array
(
[id] => 11222617
[patent_doc_number] => 09450969
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-20
[patent_title] => 'System and method for key challenge validation'
[patent_app_type] => utility
[patent_app_number] => 14/878907
[patent_app_country] => US
[patent_app_date] => 2015-10-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 6846
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14878907
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/878907 | System and method for key challenge validation | Oct 7, 2015 | Issued |
Array
(
[id] => 12576387
[patent_doc_number] => 10021069
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-10
[patent_title] => Real time dynamic client access control
[patent_app_type] => utility
[patent_app_number] => 14/873333
[patent_app_country] => US
[patent_app_date] => 2015-10-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 11913
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 407
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14873333
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/873333 | Real time dynamic client access control | Oct 1, 2015 | Issued |
Array
(
[id] => 11533910
[patent_doc_number] => 20170093890
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-30
[patent_title] => 'SECURITY DETECTION'
[patent_app_type] => utility
[patent_app_number] => 14/870135
[patent_app_country] => US
[patent_app_date] => 2015-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 10712
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14870135
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/870135 | Security detection | Sep 29, 2015 | Issued |
Array
(
[id] => 17819496
[patent_doc_number] => 11425126
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2022-08-23
[patent_title] => Sharing of computing resource policies
[patent_app_type] => utility
[patent_app_number] => 14/870585
[patent_app_country] => US
[patent_app_date] => 2015-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 15953
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14870585
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/870585 | Sharing of computing resource policies | Sep 29, 2015 | Issued |
Array
(
[id] => 12174135
[patent_doc_number] => 09892280
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-02-13
[patent_title] => 'Identifying illegitimate accounts based on images'
[patent_app_type] => utility
[patent_app_number] => 14/871780
[patent_app_country] => US
[patent_app_date] => 2015-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8931
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14871780
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/871780 | Identifying illegitimate accounts based on images | Sep 29, 2015 | Issued |
Array
(
[id] => 11863096
[patent_doc_number] => 09742801
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-08-22
[patent_title] => 'Systems and methods for preventing the execution of online malvertising'
[patent_app_type] => utility
[patent_app_number] => 14/864931
[patent_app_country] => US
[patent_app_date] => 2015-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8220
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14864931
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/864931 | Systems and methods for preventing the execution of online malvertising | Sep 24, 2015 | Issued |
Array
(
[id] => 11726328
[patent_doc_number] => 09699203
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-07-04
[patent_title] => 'Systems and methods for IP-based intrusion detection'
[patent_app_type] => utility
[patent_app_number] => 14/861217
[patent_app_country] => US
[patent_app_date] => 2015-09-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11520
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14861217
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/861217 | Systems and methods for IP-based intrusion detection | Sep 21, 2015 | Issued |
Array
(
[id] => 11525395
[patent_doc_number] => 09608815
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-28
[patent_title] => 'Systems, methods, and apparatuses for ciphering error detection and recovery'
[patent_app_type] => utility
[patent_app_number] => 14/837502
[patent_app_country] => US
[patent_app_date] => 2015-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10911
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 286
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14837502
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/837502 | Systems, methods, and apparatuses for ciphering error detection and recovery | Aug 26, 2015 | Issued |
Array
(
[id] => 14395913
[patent_doc_number] => 10311240
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-06-04
[patent_title] => Remote storage security
[patent_app_type] => utility
[patent_app_number] => 14/835652
[patent_app_country] => US
[patent_app_date] => 2015-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 13834
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14835652
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/835652 | Remote storage security | Aug 24, 2015 | Issued |
Array
(
[id] => 12398928
[patent_doc_number] => 09967236
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-05-08
[patent_title] => Credentials enforcement using a firewall
[patent_app_type] => utility
[patent_app_number] => 14/815331
[patent_app_country] => US
[patent_app_date] => 2015-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 17685
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 428
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815331
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/815331 | Credentials enforcement using a firewall | Jul 30, 2015 | Issued |