Search

Christopher J. Brown

Examiner (ID: 18112, Phone: (571)272-3833 , Office: P/2439 )

Most Active Art Unit
2439
Art Unit(s)
2134, 2439, 2434
Total Applications
955
Issued Applications
633
Pending Applications
129
Abandoned Applications
222

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 20064686 [patent_doc_number] => 20250202908 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-19 [patent_title] => SYSTEM AND METHOD FOR MONITORING AND MANAGING COMPUTING ENVIRONMENT [patent_app_type] => utility [patent_app_number] => 18/542786 [patent_app_country] => US [patent_app_date] => 2023-12-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7940 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18542786 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/542786
SYSTEM AND METHOD FOR MONITORING AND MANAGING COMPUTING ENVIRONMENT Dec 17, 2023 Pending
Array ( [id] => 19102033 [patent_doc_number] => 20240121261 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-04-11 [patent_title] => Automated Security Analysis of Software Libraries [patent_app_type] => utility [patent_app_number] => 18/543659 [patent_app_country] => US [patent_app_date] => 2023-12-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5365 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18543659 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/543659
Automated Security Analysis of Software Libraries Dec 17, 2023 Pending
Array ( [id] => 20029971 [patent_doc_number] => 20250168193 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-05-22 [patent_title] => SYSTEM AND METHOD FOR PROVIDING SECURITY POSTURE MANAGEMENT FOR AI APPLICATIONS [patent_app_type] => utility [patent_app_number] => 18/511629 [patent_app_country] => US [patent_app_date] => 2023-11-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5828 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -24 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18511629 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/511629
SYSTEM AND METHOD FOR PROVIDING SECURITY POSTURE MANAGEMENT FOR AI APPLICATIONS Nov 15, 2023 Pending
Array ( [id] => 20020752 [patent_doc_number] => 20250158974 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-05-15 [patent_title] => NF CONSUMER AUTHENTICATION WITH MODEL-D INDIRECT COMMUNICATION [patent_app_type] => utility [patent_app_number] => 18/506840 [patent_app_country] => US [patent_app_date] => 2023-11-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3426 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 148 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18506840 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/506840
NF CONSUMER AUTHENTICATION WITH MODEL-D INDIRECT COMMUNICATION Nov 9, 2023 Pending
Array ( [id] => 19162283 [patent_doc_number] => 20240154990 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-05-09 [patent_title] => DEVICE FOR AUTOMATICALLY SORTING CYBER ATTACK BASED ON ARTIFICIAL INTELLIGENCE USING SECURITY EVENT OF DIFFERENT KINDS OF SECURITY DEVICES [patent_app_type] => utility [patent_app_number] => 18/385384 [patent_app_country] => US [patent_app_date] => 2023-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5529 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -9 [patent_words_short_claim] => 266 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18385384 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/385384
DEVICE FOR AUTOMATICALLY SORTING CYBER ATTACK BASED ON ARTIFICIAL INTELLIGENCE USING SECURITY EVENT OF DIFFERENT KINDS OF SECURITY DEVICES Oct 30, 2023 Pending
Array ( [id] => 19994881 [patent_doc_number] => 20250133103 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-04-24 [patent_title] => SECURITY VULNERABILITY TRACKING AND RESOLUTION [patent_app_type] => utility [patent_app_number] => 18/491384 [patent_app_country] => US [patent_app_date] => 2023-10-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4475 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -8 [patent_words_short_claim] => 22 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18491384 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/491384
SECURITY VULNERABILITY TRACKING AND RESOLUTION Oct 19, 2023 Pending
Array ( [id] => 20415959 [patent_doc_number] => 12499245 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-12-16 [patent_title] => Methods and apparatus for selective encryption of execute in place (XIP) data [patent_app_type] => utility [patent_app_number] => 18/375372 [patent_app_country] => US [patent_app_date] => 2023-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 7700 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18375372 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/375372
Methods and apparatus for selective encryption of execute in place (XIP) data Sep 28, 2023 Issued
Array ( [id] => 19880690 [patent_doc_number] => 20250112947 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-04-03 [patent_title] => ENHANCED CONTINUOUS MITIGATION SYSTEM THROUGH THE SURVEILLANCE OF KNOWN THREATS [patent_app_type] => utility [patent_app_number] => 18/478782 [patent_app_country] => US [patent_app_date] => 2023-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7698 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 72 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18478782 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/478782
ENHANCED CONTINUOUS MITIGATION SYSTEM THROUGH THE SURVEILLANCE OF KNOWN THREATS Sep 28, 2023 Pending
Array ( [id] => 20312852 [patent_doc_number] => 20250330481 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-10-23 [patent_title] => METHODS FOR SECURITY CONTROL AND DEVICES THEREOF [patent_app_type] => utility [patent_app_number] => 18/375027 [patent_app_country] => US [patent_app_date] => 2023-09-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5212 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 80 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18375027 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/375027
METHODS FOR SECURITY CONTROL AND DEVICES THEREOF Sep 28, 2023 Pending
Array ( [id] => 19102032 [patent_doc_number] => 20240121260 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-04-11 [patent_title] => SECURITY INFORMATION CAPTURE AND DISTRIBUTION [patent_app_type] => utility [patent_app_number] => 18/476488 [patent_app_country] => US [patent_app_date] => 2023-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4378 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 46 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18476488 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/476488
SECURITY INFORMATION CAPTURE AND DISTRIBUTION Sep 27, 2023 Pending
Array ( [id] => 19533055 [patent_doc_number] => 20240356957 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-24 [patent_title] => ITERATIVE CROSS-PRODUCT THREAT DETECTION BASED ON NETWORK TELEMETRY RELATIONSHIPS [patent_app_type] => utility [patent_app_number] => 18/373765 [patent_app_country] => US [patent_app_date] => 2023-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14102 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 112 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18373765 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/373765
ITERATIVE CROSS-PRODUCT THREAT DETECTION BASED ON NETWORK TELEMETRY RELATIONSHIPS Sep 26, 2023 Pending
Array ( [id] => 18907110 [patent_doc_number] => 20240022595 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-01-18 [patent_title] => METHOD FOR SHARING CYBERSECURITY THREAT ANALYSIS AND DEFENSIVE MEASURES AMONGST A COMMUNITY [patent_app_type] => utility [patent_app_number] => 18/373157 [patent_app_country] => US [patent_app_date] => 2023-09-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 16838 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18373157 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/373157
METHOD FOR SHARING CYBERSECURITY THREAT ANALYSIS AND DEFENSIVE MEASURES AMONGST A COMMUNITY Sep 25, 2023 Pending
Array ( [id] => 20495943 [patent_doc_number] => 12537828 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2026-01-27 [patent_title] => On-demand software-defined security service orchestration for a 5G wireless network [patent_app_type] => utility [patent_app_number] => 18/473438 [patent_app_country] => US [patent_app_date] => 2023-09-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6149 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 241 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18473438 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/473438
On-demand software-defined security service orchestration for a 5G wireless network Sep 24, 2023 Issued
Array ( [id] => 19533034 [patent_doc_number] => 20240356936 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-10-24 [patent_title] => CROSS-PRODUCT ALERT RISK SCORE ASSIGNER FOR EXTENDED DETECTION AND RESPONSE (XDR) SYSTEMS [patent_app_type] => utility [patent_app_number] => 18/368413 [patent_app_country] => US [patent_app_date] => 2023-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8462 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 203 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18368413 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/368413
CROSS-PRODUCT ALERT RISK SCORE ASSIGNER FOR EXTENDED DETECTION AND RESPONSE (XDR) SYSTEMS Sep 13, 2023 Pending
Array ( [id] => 19805210 [patent_doc_number] => 20250071135 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-02-27 [patent_title] => DETECTING VULNERABILITIES BY SEEDING A COMPUTING RESOURCE WITH MONITORED SCRIPTS [patent_app_type] => utility [patent_app_number] => 18/453593 [patent_app_country] => US [patent_app_date] => 2023-08-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8627 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 77 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18453593 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/453593
DETECTING VULNERABILITIES BY SEEDING A COMPUTING RESOURCE WITH MONITORED SCRIPTS Aug 21, 2023 Pending
Array ( [id] => 19750650 [patent_doc_number] => 20250039215 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-30 [patent_title] => SYSTEM AND METHOD FOR IDENTIFYING NETWORK VULNERABILITY VIA NETWORK COMPONENT FUNCTIONALITY [patent_app_type] => utility [patent_app_number] => 18/226149 [patent_app_country] => US [patent_app_date] => 2023-07-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11165 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 149 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18226149 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/226149
SYSTEM AND METHOD FOR IDENTIFYING NETWORK VULNERABILITY VIA NETWORK COMPONENT FUNCTIONALITY Jul 24, 2023 Pending
Array ( [id] => 19727966 [patent_doc_number] => 20250030717 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-23 [patent_title] => DETECTING POLYMORPHIC BOTNETS USING AN IMAGE RECOGNITION PLATFORM [patent_app_type] => utility [patent_app_number] => 18/224902 [patent_app_country] => US [patent_app_date] => 2023-07-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10690 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 259 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18224902 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/224902
DETECTING POLYMORPHIC BOTNETS USING AN IMAGE RECOGNITION PLATFORM Jul 20, 2023 Pending
Array ( [id] => 18813980 [patent_doc_number] => 20230388317 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2023-11-30 [patent_title] => MALICIOUS HOMOGLYPHIC DOMAIN NAME DETECTION AND ASSOCIATED CYBER SECURITY APPLICATIONS [patent_app_type] => utility [patent_app_number] => 18/222901 [patent_app_country] => US [patent_app_date] => 2023-07-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 50524 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -27 [patent_words_short_claim] => 373 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18222901 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/222901
Malicious homoglyphic domain name detection and associated cyber security applications Jul 16, 2023 Issued
Array ( [id] => 19689154 [patent_doc_number] => 20250007699 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-02 [patent_title] => COMPUTER-IMPLEMENTED METHOD FOR COMPUTING UNBALANCED L-TREES EFFICIENTLY FOR HASH-BASED SIGNATURES USED IN POST-QUANTUM CRYPTOGRAPHIC AUTHENTICATION [patent_app_type] => utility [patent_app_number] => 18/572915 [patent_app_country] => US [patent_app_date] => 2023-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 3919 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -6 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18572915 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/572915
COMPUTER-IMPLEMENTED METHOD FOR COMPUTING UNBALANCED L-TREES EFFICIENTLY FOR HASH-BASED SIGNATURES USED IN POST-QUANTUM CRYPTOGRAPHIC AUTHENTICATION Jun 29, 2023 Abandoned
Array ( [id] => 19329719 [patent_doc_number] => 12047415 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2024-07-23 [patent_title] => Systems and methods to provide information security by conducting a phishing vulnerability assessment [patent_app_type] => utility [patent_app_number] => 18/334244 [patent_app_country] => US [patent_app_date] => 2023-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6293 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 173 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18334244 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/334244
Systems and methods to provide information security by conducting a phishing vulnerability assessment Jun 12, 2023 Issued
Menu