
Christopher J. Brown
Examiner (ID: 18112, Phone: (571)272-3833 , Office: P/2439 )
| Most Active Art Unit | 2439 |
| Art Unit(s) | 2134, 2439, 2434 |
| Total Applications | 955 |
| Issued Applications | 633 |
| Pending Applications | 129 |
| Abandoned Applications | 222 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 20064686
[patent_doc_number] => 20250202908
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-06-19
[patent_title] => SYSTEM AND METHOD FOR MONITORING AND MANAGING COMPUTING ENVIRONMENT
[patent_app_type] => utility
[patent_app_number] => 18/542786
[patent_app_country] => US
[patent_app_date] => 2023-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7940
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18542786
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/542786 | SYSTEM AND METHOD FOR MONITORING AND MANAGING COMPUTING ENVIRONMENT | Dec 17, 2023 | Pending |
Array
(
[id] => 19102033
[patent_doc_number] => 20240121261
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-11
[patent_title] => Automated Security Analysis of Software Libraries
[patent_app_type] => utility
[patent_app_number] => 18/543659
[patent_app_country] => US
[patent_app_date] => 2023-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5365
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18543659
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/543659 | Automated Security Analysis of Software Libraries | Dec 17, 2023 | Pending |
Array
(
[id] => 20029971
[patent_doc_number] => 20250168193
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-05-22
[patent_title] => SYSTEM AND METHOD FOR PROVIDING SECURITY POSTURE MANAGEMENT FOR AI APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 18/511629
[patent_app_country] => US
[patent_app_date] => 2023-11-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5828
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -24
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18511629
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/511629 | SYSTEM AND METHOD FOR PROVIDING SECURITY POSTURE MANAGEMENT FOR AI APPLICATIONS | Nov 15, 2023 | Pending |
Array
(
[id] => 20020752
[patent_doc_number] => 20250158974
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-05-15
[patent_title] => NF CONSUMER AUTHENTICATION WITH MODEL-D INDIRECT COMMUNICATION
[patent_app_type] => utility
[patent_app_number] => 18/506840
[patent_app_country] => US
[patent_app_date] => 2023-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3426
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18506840
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/506840 | NF CONSUMER AUTHENTICATION WITH MODEL-D INDIRECT COMMUNICATION | Nov 9, 2023 | Pending |
Array
(
[id] => 19162283
[patent_doc_number] => 20240154990
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-05-09
[patent_title] => DEVICE FOR AUTOMATICALLY SORTING CYBER ATTACK BASED ON ARTIFICIAL INTELLIGENCE USING SECURITY EVENT OF DIFFERENT KINDS OF SECURITY DEVICES
[patent_app_type] => utility
[patent_app_number] => 18/385384
[patent_app_country] => US
[patent_app_date] => 2023-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5529
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -9
[patent_words_short_claim] => 266
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18385384
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/385384 | DEVICE FOR AUTOMATICALLY SORTING CYBER ATTACK BASED ON ARTIFICIAL INTELLIGENCE USING SECURITY EVENT OF DIFFERENT KINDS OF SECURITY DEVICES | Oct 30, 2023 | Pending |
Array
(
[id] => 19994881
[patent_doc_number] => 20250133103
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-04-24
[patent_title] => SECURITY VULNERABILITY TRACKING AND RESOLUTION
[patent_app_type] => utility
[patent_app_number] => 18/491384
[patent_app_country] => US
[patent_app_date] => 2023-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4475
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -8
[patent_words_short_claim] => 22
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18491384
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/491384 | SECURITY VULNERABILITY TRACKING AND RESOLUTION | Oct 19, 2023 | Pending |
Array
(
[id] => 20415959
[patent_doc_number] => 12499245
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-12-16
[patent_title] => Methods and apparatus for selective encryption of execute in place (XIP) data
[patent_app_type] => utility
[patent_app_number] => 18/375372
[patent_app_country] => US
[patent_app_date] => 2023-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7700
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18375372
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/375372 | Methods and apparatus for selective encryption of execute in place (XIP) data | Sep 28, 2023 | Issued |
Array
(
[id] => 19880690
[patent_doc_number] => 20250112947
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-04-03
[patent_title] => ENHANCED CONTINUOUS MITIGATION SYSTEM THROUGH THE SURVEILLANCE OF KNOWN THREATS
[patent_app_type] => utility
[patent_app_number] => 18/478782
[patent_app_country] => US
[patent_app_date] => 2023-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7698
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 72
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18478782
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/478782 | ENHANCED CONTINUOUS MITIGATION SYSTEM THROUGH THE SURVEILLANCE OF KNOWN THREATS | Sep 28, 2023 | Pending |
Array
(
[id] => 20312852
[patent_doc_number] => 20250330481
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-10-23
[patent_title] => METHODS FOR SECURITY CONTROL AND DEVICES THEREOF
[patent_app_type] => utility
[patent_app_number] => 18/375027
[patent_app_country] => US
[patent_app_date] => 2023-09-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5212
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18375027
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/375027 | METHODS FOR SECURITY CONTROL AND DEVICES THEREOF | Sep 28, 2023 | Pending |
Array
(
[id] => 19102032
[patent_doc_number] => 20240121260
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-04-11
[patent_title] => SECURITY INFORMATION CAPTURE AND DISTRIBUTION
[patent_app_type] => utility
[patent_app_number] => 18/476488
[patent_app_country] => US
[patent_app_date] => 2023-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4378
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 46
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18476488
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/476488 | SECURITY INFORMATION CAPTURE AND DISTRIBUTION | Sep 27, 2023 | Pending |
Array
(
[id] => 19533055
[patent_doc_number] => 20240356957
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-24
[patent_title] => ITERATIVE CROSS-PRODUCT THREAT DETECTION BASED ON NETWORK TELEMETRY RELATIONSHIPS
[patent_app_type] => utility
[patent_app_number] => 18/373765
[patent_app_country] => US
[patent_app_date] => 2023-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14102
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 112
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18373765
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/373765 | ITERATIVE CROSS-PRODUCT THREAT DETECTION BASED ON NETWORK TELEMETRY RELATIONSHIPS | Sep 26, 2023 | Pending |
Array
(
[id] => 18907110
[patent_doc_number] => 20240022595
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-01-18
[patent_title] => METHOD FOR SHARING CYBERSECURITY THREAT ANALYSIS AND DEFENSIVE MEASURES AMONGST A COMMUNITY
[patent_app_type] => utility
[patent_app_number] => 18/373157
[patent_app_country] => US
[patent_app_date] => 2023-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 16838
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18373157
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/373157 | METHOD FOR SHARING CYBERSECURITY THREAT ANALYSIS AND DEFENSIVE MEASURES AMONGST A COMMUNITY | Sep 25, 2023 | Pending |
Array
(
[id] => 20495943
[patent_doc_number] => 12537828
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2026-01-27
[patent_title] => On-demand software-defined security service orchestration for a 5G wireless network
[patent_app_type] => utility
[patent_app_number] => 18/473438
[patent_app_country] => US
[patent_app_date] => 2023-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6149
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18473438
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/473438 | On-demand software-defined security service orchestration for a 5G wireless network | Sep 24, 2023 | Issued |
Array
(
[id] => 19533034
[patent_doc_number] => 20240356936
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2024-10-24
[patent_title] => CROSS-PRODUCT ALERT RISK SCORE ASSIGNER FOR EXTENDED DETECTION AND RESPONSE (XDR) SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 18/368413
[patent_app_country] => US
[patent_app_date] => 2023-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8462
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 203
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18368413
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/368413 | CROSS-PRODUCT ALERT RISK SCORE ASSIGNER FOR EXTENDED DETECTION AND RESPONSE (XDR) SYSTEMS | Sep 13, 2023 | Pending |
Array
(
[id] => 19805210
[patent_doc_number] => 20250071135
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-02-27
[patent_title] => DETECTING VULNERABILITIES BY SEEDING A COMPUTING RESOURCE WITH MONITORED SCRIPTS
[patent_app_type] => utility
[patent_app_number] => 18/453593
[patent_app_country] => US
[patent_app_date] => 2023-08-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8627
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18453593
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/453593 | DETECTING VULNERABILITIES BY SEEDING A COMPUTING RESOURCE WITH MONITORED SCRIPTS | Aug 21, 2023 | Pending |
Array
(
[id] => 19750650
[patent_doc_number] => 20250039215
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-30
[patent_title] => SYSTEM AND METHOD FOR IDENTIFYING NETWORK VULNERABILITY VIA NETWORK COMPONENT FUNCTIONALITY
[patent_app_type] => utility
[patent_app_number] => 18/226149
[patent_app_country] => US
[patent_app_date] => 2023-07-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11165
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18226149
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/226149 | SYSTEM AND METHOD FOR IDENTIFYING NETWORK VULNERABILITY VIA NETWORK COMPONENT FUNCTIONALITY | Jul 24, 2023 | Pending |
Array
(
[id] => 19727966
[patent_doc_number] => 20250030717
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-23
[patent_title] => DETECTING POLYMORPHIC BOTNETS USING AN IMAGE RECOGNITION PLATFORM
[patent_app_type] => utility
[patent_app_number] => 18/224902
[patent_app_country] => US
[patent_app_date] => 2023-07-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10690
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18224902
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/224902 | DETECTING POLYMORPHIC BOTNETS USING AN IMAGE RECOGNITION PLATFORM | Jul 20, 2023 | Pending |
Array
(
[id] => 18813980
[patent_doc_number] => 20230388317
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2023-11-30
[patent_title] => MALICIOUS HOMOGLYPHIC DOMAIN NAME DETECTION AND ASSOCIATED CYBER SECURITY APPLICATIONS
[patent_app_type] => utility
[patent_app_number] => 18/222901
[patent_app_country] => US
[patent_app_date] => 2023-07-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 50524
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -27
[patent_words_short_claim] => 373
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18222901
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/222901 | Malicious homoglyphic domain name detection and associated cyber security applications | Jul 16, 2023 | Issued |
Array
(
[id] => 19689154
[patent_doc_number] => 20250007699
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2025-01-02
[patent_title] => COMPUTER-IMPLEMENTED METHOD FOR COMPUTING UNBALANCED L-TREES EFFICIENTLY FOR HASH-BASED SIGNATURES USED IN POST-QUANTUM CRYPTOGRAPHIC AUTHENTICATION
[patent_app_type] => utility
[patent_app_number] => 18/572915
[patent_app_country] => US
[patent_app_date] => 2023-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3919
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18572915
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/572915 | COMPUTER-IMPLEMENTED METHOD FOR COMPUTING UNBALANCED L-TREES EFFICIENTLY FOR HASH-BASED SIGNATURES USED IN POST-QUANTUM CRYPTOGRAPHIC AUTHENTICATION | Jun 29, 2023 | Abandoned |
Array
(
[id] => 19329719
[patent_doc_number] => 12047415
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2024-07-23
[patent_title] => Systems and methods to provide information security by conducting a phishing vulnerability assessment
[patent_app_type] => utility
[patent_app_number] => 18/334244
[patent_app_country] => US
[patent_app_date] => 2023-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6293
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 173
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18334244
[rel_patent_id] =>[rel_patent_doc_number] =>) 18/334244 | Systems and methods to provide information security by conducting a phishing vulnerability assessment | Jun 12, 2023 | Issued |