
Christopher J. Brown
Examiner (ID: 10584)
| Most Active Art Unit | 2439 |
| Art Unit(s) | 2134, 2439, 2434 |
| Total Applications | 972 |
| Issued Applications | 641 |
| Pending Applications | 123 |
| Abandoned Applications | 224 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17744864
[patent_doc_number] => 11392938
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-07-19
[patent_title] => Electronic transaction security system and method
[patent_app_type] => utility
[patent_app_number] => 14/810214
[patent_app_country] => US
[patent_app_date] => 2015-07-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11605
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14810214
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/810214 | Electronic transaction security system and method | Jul 26, 2015 | Issued |
Array
(
[id] => 14957425
[patent_doc_number] => 10440000
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-08
[patent_title] => Secure data provisioning
[patent_app_type] => utility
[patent_app_number] => 15/322707
[patent_app_country] => US
[patent_app_date] => 2015-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 5962
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 243
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15322707
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/322707 | Secure data provisioning | Jul 8, 2015 | Issued |
Array
(
[id] => 10427236
[patent_doc_number] => 20150312247
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-29
[patent_title] => 'OBJECT DELIVERY AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/792659
[patent_app_country] => US
[patent_app_date] => 2015-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5111
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14792659
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/792659 | Object delivery authentication | Jul 6, 2015 | Issued |
Array
(
[id] => 11982506
[patent_doc_number] => 20170286660
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-05
[patent_title] => 'Method for Unlocking Screen by Using Fingerprint and Terminal'
[patent_app_type] => utility
[patent_app_number] => 15/511280
[patent_app_country] => US
[patent_app_date] => 2015-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4310
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15511280
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/511280 | Method for unlocking screen by using fingerprint and terminal | Jun 29, 2015 | Issued |
Array
(
[id] => 13771543
[patent_doc_number] => 10178126
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-08
[patent_title] => Activity-based risk selection of open Wi-Fi networks
[patent_app_type] => utility
[patent_app_number] => 14/753568
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12052
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 549
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14753568
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/753568 | Activity-based risk selection of open Wi-Fi networks | Jun 28, 2015 | Issued |
Array
(
[id] => 13122971
[patent_doc_number] => 10079849
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-09-18
[patent_title] => Risk assessment of open Wi-Fi networks
[patent_app_type] => utility
[patent_app_number] => 14/753539
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 8324
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 454
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14753539
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/753539 | Risk assessment of open Wi-Fi networks | Jun 28, 2015 | Issued |
Array
(
[id] => 13684595
[patent_doc_number] => 20160381034
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-29
[patent_title] => MANAGING DATA PRIVACY AND INFORMATION SAFETY
[patent_app_type] => utility
[patent_app_number] => 14/753114
[patent_app_country] => US
[patent_app_date] => 2015-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9544
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14753114
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/753114 | Managing data privacy and information safety | Jun 28, 2015 | Issued |
Array
(
[id] => 11788480
[patent_doc_number] => 09397984
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-07-19
[patent_title] => 'Apparatus and method for secure file transfer'
[patent_app_type] => utility
[patent_app_number] => 14/750567
[patent_app_country] => US
[patent_app_date] => 2015-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 5111
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14750567
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/750567 | Apparatus and method for secure file transfer | Jun 24, 2015 | Issued |
Array
(
[id] => 13684567
[patent_doc_number] => 20160381020
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-29
[patent_title] => COMBINED KEY SECURITY
[patent_app_type] => utility
[patent_app_number] => 14/746915
[patent_app_country] => US
[patent_app_date] => 2015-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4567
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14746915
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/746915 | COMBINED KEY SECURITY | Jun 22, 2015 | Abandoned |
Array
(
[id] => 10386185
[patent_doc_number] => 20150271192
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-24
[patent_title] => 'SYSTEM AND METHOD FOR CONTINUOUS DEVICE PROFILING'
[patent_app_type] => utility
[patent_app_number] => 14/734822
[patent_app_country] => US
[patent_app_date] => 2015-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7148
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14734822
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/734822 | System and method for continuous device profiling | Jun 8, 2015 | Issued |
Array
(
[id] => 11340359
[patent_doc_number] => 20160366115
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'CALL ENCRYPTION SYSTEMS AND METHODS'
[patent_app_type] => utility
[patent_app_number] => 14/734939
[patent_app_country] => US
[patent_app_date] => 2015-06-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6448
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14734939
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/734939 | Call encryption systems and methods | Jun 8, 2015 | Issued |
Array
(
[id] => 11329273
[patent_doc_number] => 20160359885
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-08
[patent_title] => 'UNAUTHORIZED BEACON DETECTION'
[patent_app_type] => utility
[patent_app_number] => 14/730301
[patent_app_country] => US
[patent_app_date] => 2015-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4597
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14730301
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/730301 | UNAUTHORIZED BEACON DETECTION | Jun 3, 2015 | Abandoned |
Array
(
[id] => 10827336
[patent_doc_number] => 20160173506
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-16
[patent_title] => 'PROTECTING MOBILE DEVICES FROM MALWARE'
[patent_app_type] => utility
[patent_app_number] => 14/722245
[patent_app_country] => US
[patent_app_date] => 2015-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7812
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14722245
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/722245 | Protecting mobile devices from malware | May 26, 2015 | Issued |
Array
(
[id] => 10344996
[patent_doc_number] => 20150230001
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-13
[patent_title] => 'Digital Cinema Distribution Method And Apparatus'
[patent_app_type] => utility
[patent_app_number] => 14/698236
[patent_app_country] => US
[patent_app_date] => 2015-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 4969
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14698236
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/698236 | Digital Cinema Distribution Method And Apparatus | Apr 27, 2015 | Abandoned |
Array
(
[id] => 10328267
[patent_doc_number] => 20150213271
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-30
[patent_title] => 'SYSTEM AND METHOD FOR LIMITING EXPLOITABLE OR POTENTIALLY EXPLOITABLE SUB-COMPONENTS IN SOFTWARE COMPONENTS'
[patent_app_type] => utility
[patent_app_number] => 14/679831
[patent_app_country] => US
[patent_app_date] => 2015-04-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 23730
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14679831
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/679831 | System and method for limiting exploitable or potentially exploitable sub-components in software components | Apr 5, 2015 | Issued |
Array
(
[id] => 12224765
[patent_doc_number] => 20180063126
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-01
[patent_title] => 'METHODS AND USER DEVICE AND AUTHENTICATOR DEVICE FOR AUTHENTICATION OF THE USER DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/559854
[patent_app_country] => US
[patent_app_date] => 2015-03-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7562
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15559854
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/559854 | Methods and user device and authenticator device for authentication of the user device | Mar 22, 2015 | Issued |
Array
(
[id] => 10113000
[patent_doc_number] => 09148424
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-09-29
[patent_title] => 'Systems and methods for IP-based intrusion detection'
[patent_app_type] => utility
[patent_app_number] => 14/657739
[patent_app_country] => US
[patent_app_date] => 2015-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11482
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 277
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14657739
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/657739 | Systems and methods for IP-based intrusion detection | Mar 12, 2015 | Issued |
Array
(
[id] => 14331445
[patent_doc_number] => 10296743
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-05-21
[patent_title] => Method and device for constructing APK virus signature database and APK virus detection system
[patent_app_type] => utility
[patent_app_number] => 15/124951
[patent_app_country] => US
[patent_app_date] => 2015-03-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 9283
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 237
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15124951
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/124951 | Method and device for constructing APK virus signature database and APK virus detection system | Mar 2, 2015 | Issued |
Array
(
[id] => 11460839
[patent_doc_number] => 20170054745
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-23
[patent_title] => 'METHOD AND DEVICE FOR PROCESSING NETWORK THREAT'
[patent_app_type] => utility
[patent_app_number] => 15/119598
[patent_app_country] => US
[patent_app_date] => 2014-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 8730
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15119598
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/119598 | METHOD AND DEVICE FOR PROCESSING NETWORK THREAT | Dec 29, 2014 | Abandoned |
Array
(
[id] => 10221961
[patent_doc_number] => 20150106954
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-16
[patent_title] => 'CONTENT TRANSMISSION DEVICE AND CONTENT RECEPTION DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/575902
[patent_app_country] => US
[patent_app_date] => 2014-12-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 9898
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14575902
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/575902 | CONTENT TRANSMISSION DEVICE AND CONTENT RECEPTION DEVICE | Dec 17, 2014 | Abandoned |