
Christopher J. Brown
Examiner (ID: 10584)
| Most Active Art Unit | 2439 |
| Art Unit(s) | 2134, 2439, 2434 |
| Total Applications | 972 |
| Issued Applications | 641 |
| Pending Applications | 123 |
| Abandoned Applications | 224 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10827330
[patent_doc_number] => 20160173500
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-16
[patent_title] => 'MULTI-TENANT SECURITY IN THE CLOUD'
[patent_app_type] => utility
[patent_app_number] => 14/572443
[patent_app_country] => US
[patent_app_date] => 2014-12-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5166
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14572443
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/572443 | Multi-tenant security in the cloud | Dec 15, 2014 | Issued |
Array
(
[id] => 12046604
[patent_doc_number] => 09824207
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-11-21
[patent_title] => 'Authentication information update based on fraud detection'
[patent_app_type] => utility
[patent_app_number] => 14/571254
[patent_app_country] => US
[patent_app_date] => 2014-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 24556
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14571254
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/571254 | Authentication information update based on fraud detection | Dec 14, 2014 | Issued |
Array
(
[id] => 12956623
[patent_doc_number] => 09838384
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-12-05
[patent_title] => Password-based fraud detection
[patent_app_type] => utility
[patent_app_number] => 14/571247
[patent_app_country] => US
[patent_app_date] => 2014-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 24418
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14571247
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/571247 | Password-based fraud detection | Dec 14, 2014 | Issued |
Array
(
[id] => 16494696
[patent_doc_number] => 10860739
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-12-08
[patent_title] => Encryption of media based on content
[patent_app_type] => utility
[patent_app_number] => 14/568621
[patent_app_country] => US
[patent_app_date] => 2014-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4139
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14568621
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/568621 | Encryption of media based on content | Dec 11, 2014 | Issued |
Array
(
[id] => 10825049
[patent_doc_number] => 20160171215
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-16
[patent_title] => 'PROTECTING MOBILE DEVICES FROM MALWARE'
[patent_app_type] => utility
[patent_app_number] => 14/568160
[patent_app_country] => US
[patent_app_date] => 2014-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7839
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14568160
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/568160 | Protecting mobile devices from malware | Dec 11, 2014 | Issued |
Array
(
[id] => 10376941
[patent_doc_number] => 20150261948
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'TWO-FACTOR AUTHENTICATION METHODS AND SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 14/569196
[patent_app_country] => US
[patent_app_date] => 2014-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6182
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14569196
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/569196 | TWO-FACTOR AUTHENTICATION METHODS AND SYSTEMS | Dec 11, 2014 | Abandoned |
Array
(
[id] => 11711854
[patent_doc_number] => 20170180354
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-22
[patent_title] => 'USE OF CERTIFICATES USING A POSITIVE LIST'
[patent_app_type] => utility
[patent_app_number] => 15/116035
[patent_app_country] => US
[patent_app_date] => 2014-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6057
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15116035
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/116035 | Use of certificates using a positive list | Dec 7, 2014 | Issued |
Array
(
[id] => 11511294
[patent_doc_number] => 09602468
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-03-21
[patent_title] => 'Techniques to authenticate a client to a proxy through a domain name server intermediary'
[patent_app_type] => utility
[patent_app_number] => 14/548024
[patent_app_country] => US
[patent_app_date] => 2014-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13888
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14548024
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/548024 | Techniques to authenticate a client to a proxy through a domain name server intermediary | Nov 18, 2014 | Issued |
Array
(
[id] => 10342728
[patent_doc_number] => 20150227733
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-13
[patent_title] => 'AUTOMATIC LOGIN SYSTEM AND AUTOMATIC LOGIN METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/543938
[patent_app_country] => US
[patent_app_date] => 2014-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2158
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14543938
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/543938 | AUTOMATIC LOGIN SYSTEM AND AUTOMATIC LOGIN METHOD | Nov 17, 2014 | Abandoned |
Array
(
[id] => 11247399
[patent_doc_number] => 09473454
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-18
[patent_title] => 'Security gateway communication'
[patent_app_type] => utility
[patent_app_number] => 14/532876
[patent_app_country] => US
[patent_app_date] => 2014-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 15
[patent_no_of_words] => 16127
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14532876
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/532876 | Security gateway communication | Nov 3, 2014 | Issued |
Array
(
[id] => 15855363
[patent_doc_number] => 10642968
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-05-05
[patent_title] => Controlling a device
[patent_app_type] => utility
[patent_app_number] => 15/512277
[patent_app_country] => US
[patent_app_date] => 2014-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7344
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15512277
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/512277 | Controlling a device | Sep 23, 2014 | Issued |
Array
(
[id] => 10379052
[patent_doc_number] => 20150264059
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'MALWARE DETECTOR'
[patent_app_type] => utility
[patent_app_number] => 14/482793
[patent_app_country] => US
[patent_app_date] => 2014-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7295
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14482793
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/482793 | Malware detector | Sep 9, 2014 | Issued |
Array
(
[id] => 9954711
[patent_doc_number] => 09003525
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-04-07
[patent_title] => 'System and method for limiting exploitable or potentially exploitable sub-components in software components'
[patent_app_type] => utility
[patent_app_number] => 14/467933
[patent_app_country] => US
[patent_app_date] => 2014-08-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 15
[patent_no_of_words] => 23725
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 202
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14467933
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/467933 | System and method for limiting exploitable or potentially exploitable sub-components in software components | Aug 24, 2014 | Issued |
Array
(
[id] => 10773220
[patent_doc_number] => 20160119376
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'SYSTEM AND METHOD FOR FILTERING ELECTRONIC MESSAGES'
[patent_app_type] => utility
[patent_app_number] => 14/894844
[patent_app_country] => US
[patent_app_date] => 2014-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7321
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14894844
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/894844 | System and method for filtering electronic messages | Jun 16, 2014 | Issued |
Array
(
[id] => 11509515
[patent_doc_number] => 09600676
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-03-21
[patent_title] => 'Application-level wireless security for wearable devices'
[patent_app_type] => utility
[patent_app_number] => 14/306192
[patent_app_country] => US
[patent_app_date] => 2014-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 19
[patent_no_of_words] => 17703
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 309
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14306192
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/306192 | Application-level wireless security for wearable devices | Jun 15, 2014 | Issued |
Array
(
[id] => 11792235
[patent_doc_number] => 09401896
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-26
[patent_title] => 'Systems and methods for authenticating and protecting the integrity of data streams and other data'
[patent_app_type] => utility
[patent_app_number] => 14/304422
[patent_app_country] => US
[patent_app_date] => 2014-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 23
[patent_no_of_words] => 11919
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 165
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14304422
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/304422 | Systems and methods for authenticating and protecting the integrity of data streams and other data | Jun 12, 2014 | Issued |
Array
(
[id] => 10969721
[patent_doc_number] => 20140372754
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-12-18
[patent_title] => 'IMAGE BASED KEY DERIVATION FUNCTION'
[patent_app_type] => utility
[patent_app_number] => 14/304488
[patent_app_country] => US
[patent_app_date] => 2014-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 9767
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14304488
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/304488 | Image based key derivation function | Jun 12, 2014 | Issued |
Array
(
[id] => 11228234
[patent_doc_number] => 09455962
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-27
[patent_title] => 'Protecting memory interface'
[patent_app_type] => utility
[patent_app_number] => 14/301456
[patent_app_country] => US
[patent_app_date] => 2014-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6075
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14301456
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/301456 | Protecting memory interface | Jun 10, 2014 | Issued |
Array
(
[id] => 11321019
[patent_doc_number] => 09519763
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-12-13
[patent_title] => 'Optical cognition and visual authentication and authorization for mobile devices'
[patent_app_type] => utility
[patent_app_number] => 14/291623
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3550
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 107
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291623
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/291623 | Optical cognition and visual authentication and authorization for mobile devices | May 29, 2014 | Issued |
Array
(
[id] => 10371340
[patent_doc_number] => 20150256345
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-10
[patent_title] => 'REVOCATION OF ROOT CERTIFICATES'
[patent_app_type] => utility
[patent_app_number] => 14/279109
[patent_app_country] => US
[patent_app_date] => 2014-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6154
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14279109
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/279109 | Revocation of root certificates | May 14, 2014 | Issued |