Search

Christopher J. Brown

Examiner (ID: 10584)

Most Active Art Unit
2439
Art Unit(s)
2134, 2439, 2434
Total Applications
972
Issued Applications
641
Pending Applications
123
Abandoned Applications
224

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10827330 [patent_doc_number] => 20160173500 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-06-16 [patent_title] => 'MULTI-TENANT SECURITY IN THE CLOUD' [patent_app_type] => utility [patent_app_number] => 14/572443 [patent_app_country] => US [patent_app_date] => 2014-12-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5166 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14572443 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/572443
Multi-tenant security in the cloud Dec 15, 2014 Issued
Array ( [id] => 12046604 [patent_doc_number] => 09824207 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-11-21 [patent_title] => 'Authentication information update based on fraud detection' [patent_app_type] => utility [patent_app_number] => 14/571254 [patent_app_country] => US [patent_app_date] => 2014-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 24556 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 205 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14571254 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/571254
Authentication information update based on fraud detection Dec 14, 2014 Issued
Array ( [id] => 12956623 [patent_doc_number] => 09838384 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-12-05 [patent_title] => Password-based fraud detection [patent_app_type] => utility [patent_app_number] => 14/571247 [patent_app_country] => US [patent_app_date] => 2014-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 24418 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 189 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14571247 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/571247
Password-based fraud detection Dec 14, 2014 Issued
Array ( [id] => 16494696 [patent_doc_number] => 10860739 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-12-08 [patent_title] => Encryption of media based on content [patent_app_type] => utility [patent_app_number] => 14/568621 [patent_app_country] => US [patent_app_date] => 2014-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4139 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 245 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14568621 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/568621
Encryption of media based on content Dec 11, 2014 Issued
Array ( [id] => 10825049 [patent_doc_number] => 20160171215 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-06-16 [patent_title] => 'PROTECTING MOBILE DEVICES FROM MALWARE' [patent_app_type] => utility [patent_app_number] => 14/568160 [patent_app_country] => US [patent_app_date] => 2014-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7839 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14568160 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/568160
Protecting mobile devices from malware Dec 11, 2014 Issued
Array ( [id] => 10376941 [patent_doc_number] => 20150261948 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'TWO-FACTOR AUTHENTICATION METHODS AND SYSTEMS' [patent_app_type] => utility [patent_app_number] => 14/569196 [patent_app_country] => US [patent_app_date] => 2014-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6182 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14569196 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/569196
TWO-FACTOR AUTHENTICATION METHODS AND SYSTEMS Dec 11, 2014 Abandoned
Array ( [id] => 11711854 [patent_doc_number] => 20170180354 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-06-22 [patent_title] => 'USE OF CERTIFICATES USING A POSITIVE LIST' [patent_app_type] => utility [patent_app_number] => 15/116035 [patent_app_country] => US [patent_app_date] => 2014-12-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6057 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15116035 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/116035
Use of certificates using a positive list Dec 7, 2014 Issued
Array ( [id] => 11511294 [patent_doc_number] => 09602468 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-03-21 [patent_title] => 'Techniques to authenticate a client to a proxy through a domain name server intermediary' [patent_app_type] => utility [patent_app_number] => 14/548024 [patent_app_country] => US [patent_app_date] => 2014-11-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 13888 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 115 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14548024 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/548024
Techniques to authenticate a client to a proxy through a domain name server intermediary Nov 18, 2014 Issued
Array ( [id] => 10342728 [patent_doc_number] => 20150227733 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-08-13 [patent_title] => 'AUTOMATIC LOGIN SYSTEM AND AUTOMATIC LOGIN METHOD' [patent_app_type] => utility [patent_app_number] => 14/543938 [patent_app_country] => US [patent_app_date] => 2014-11-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2158 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14543938 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/543938
AUTOMATIC LOGIN SYSTEM AND AUTOMATIC LOGIN METHOD Nov 17, 2014 Abandoned
Array ( [id] => 11247399 [patent_doc_number] => 09473454 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-10-18 [patent_title] => 'Security gateway communication' [patent_app_type] => utility [patent_app_number] => 14/532876 [patent_app_country] => US [patent_app_date] => 2014-11-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 15 [patent_no_of_words] => 16127 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 153 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14532876 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/532876
Security gateway communication Nov 3, 2014 Issued
Array ( [id] => 15855363 [patent_doc_number] => 10642968 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-05-05 [patent_title] => Controlling a device [patent_app_type] => utility [patent_app_number] => 15/512277 [patent_app_country] => US [patent_app_date] => 2014-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7344 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 95 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15512277 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/512277
Controlling a device Sep 23, 2014 Issued
Array ( [id] => 10379052 [patent_doc_number] => 20150264059 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'MALWARE DETECTOR' [patent_app_type] => utility [patent_app_number] => 14/482793 [patent_app_country] => US [patent_app_date] => 2014-09-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7295 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14482793 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/482793
Malware detector Sep 9, 2014 Issued
Array ( [id] => 9954711 [patent_doc_number] => 09003525 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-04-07 [patent_title] => 'System and method for limiting exploitable or potentially exploitable sub-components in software components' [patent_app_type] => utility [patent_app_number] => 14/467933 [patent_app_country] => US [patent_app_date] => 2014-08-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 15 [patent_no_of_words] => 23725 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 202 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14467933 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/467933
System and method for limiting exploitable or potentially exploitable sub-components in software components Aug 24, 2014 Issued
Array ( [id] => 10773220 [patent_doc_number] => 20160119376 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-28 [patent_title] => 'SYSTEM AND METHOD FOR FILTERING ELECTRONIC MESSAGES' [patent_app_type] => utility [patent_app_number] => 14/894844 [patent_app_country] => US [patent_app_date] => 2014-06-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7321 [patent_no_of_claims] => 26 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14894844 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/894844
System and method for filtering electronic messages Jun 16, 2014 Issued
Array ( [id] => 11509515 [patent_doc_number] => 09600676 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-03-21 [patent_title] => 'Application-level wireless security for wearable devices' [patent_app_type] => utility [patent_app_number] => 14/306192 [patent_app_country] => US [patent_app_date] => 2014-06-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 19 [patent_no_of_words] => 17703 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 309 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14306192 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/306192
Application-level wireless security for wearable devices Jun 15, 2014 Issued
Array ( [id] => 11792235 [patent_doc_number] => 09401896 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-07-26 [patent_title] => 'Systems and methods for authenticating and protecting the integrity of data streams and other data' [patent_app_type] => utility [patent_app_number] => 14/304422 [patent_app_country] => US [patent_app_date] => 2014-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 23 [patent_no_of_words] => 11919 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14304422 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/304422
Systems and methods for authenticating and protecting the integrity of data streams and other data Jun 12, 2014 Issued
Array ( [id] => 10969721 [patent_doc_number] => 20140372754 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-12-18 [patent_title] => 'IMAGE BASED KEY DERIVATION FUNCTION' [patent_app_type] => utility [patent_app_number] => 14/304488 [patent_app_country] => US [patent_app_date] => 2014-06-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 14 [patent_no_of_words] => 9767 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14304488 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/304488
Image based key derivation function Jun 12, 2014 Issued
Array ( [id] => 11228234 [patent_doc_number] => 09455962 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-09-27 [patent_title] => 'Protecting memory interface' [patent_app_type] => utility [patent_app_number] => 14/301456 [patent_app_country] => US [patent_app_date] => 2014-06-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6075 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 144 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14301456 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/301456
Protecting memory interface Jun 10, 2014 Issued
Array ( [id] => 11321019 [patent_doc_number] => 09519763 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-12-13 [patent_title] => 'Optical cognition and visual authentication and authorization for mobile devices' [patent_app_type] => utility [patent_app_number] => 14/291623 [patent_app_country] => US [patent_app_date] => 2014-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3550 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 107 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291623 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/291623
Optical cognition and visual authentication and authorization for mobile devices May 29, 2014 Issued
Array ( [id] => 10371340 [patent_doc_number] => 20150256345 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-10 [patent_title] => 'REVOCATION OF ROOT CERTIFICATES' [patent_app_type] => utility [patent_app_number] => 14/279109 [patent_app_country] => US [patent_app_date] => 2014-05-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6154 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14279109 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/279109
Revocation of root certificates May 14, 2014 Issued
Menu