
Christopher J. Brown
Examiner (ID: 10584)
| Most Active Art Unit | 2439 |
| Art Unit(s) | 2134, 2439, 2434 |
| Total Applications | 972 |
| Issued Applications | 641 |
| Pending Applications | 123 |
| Abandoned Applications | 224 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11215576
[patent_doc_number] => 09444625
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-13
[patent_title] => 'Systems and methods for authenticating an electronic message'
[patent_app_type] => utility
[patent_app_number] => 13/936568
[patent_app_country] => US
[patent_app_date] => 2013-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 7133
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13936568
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/936568 | Systems and methods for authenticating an electronic message | Jul 7, 2013 | Issued |
Array
(
[id] => 10991954
[patent_doc_number] => 20160188899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-30
[patent_title] => 'SECURITY ENHANCEMENT BASED ON USE OF ICONS WITH PASS CODES'
[patent_app_type] => utility
[patent_app_number] => 14/896559
[patent_app_country] => US
[patent_app_date] => 2013-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3290
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14896559
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/896559 | SECURITY ENHANCEMENT BASED ON USE OF ICONS WITH PASS CODES | Jun 11, 2013 | Abandoned |
Array
(
[id] => 9919553
[patent_doc_number] => 20150074758
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-12
[patent_title] => 'METHOD OF USING A MOBILE TERMINAL TO IMPLEMENT CLOUD SEARCHING'
[patent_app_type] => utility
[patent_app_number] => 14/389559
[patent_app_country] => US
[patent_app_date] => 2013-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3491
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14389559
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/389559 | Method of using a mobile terminal to implement cloud searching | May 27, 2013 | Issued |
Array
(
[id] => 9056815
[patent_doc_number] => 20130254529
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-26
[patent_title] => 'METHOD AND APPARATUS FOR PROVIDING A SCALABLE SERVICE PLATFORM USING A NETWORK CACHE'
[patent_app_type] => utility
[patent_app_number] => 13/874154
[patent_app_country] => US
[patent_app_date] => 2013-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8877
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13874154
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/874154 | Method and apparatus for providing a scalable service platform using a network cache | Apr 29, 2013 | Issued |
Array
(
[id] => 10732055
[patent_doc_number] => 20160078205
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'DISPLACEMENT SIGNATURES'
[patent_app_type] => utility
[patent_app_number] => 14/784667
[patent_app_country] => US
[patent_app_date] => 2013-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7568
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14784667
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/784667 | DISPLACEMENT SIGNATURES | Apr 23, 2013 | Abandoned |
Array
(
[id] => 10732061
[patent_doc_number] => 20160078211
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'LOCATION SIGNATURES'
[patent_app_type] => utility
[patent_app_number] => 14/785433
[patent_app_country] => US
[patent_app_date] => 2013-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6847
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14785433
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/785433 | LOCATION SIGNATURES | Apr 23, 2013 | Abandoned |
Array
(
[id] => 10210979
[patent_doc_number] => 20150095971
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-02
[patent_title] => 'AUTHENTICATION IN COMPUTER NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 14/390571
[patent_app_country] => US
[patent_app_date] => 2013-04-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 18585
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14390571
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/390571 | AUTHENTICATION IN COMPUTER NETWORKS | Apr 4, 2013 | Abandoned |
Array
(
[id] => 9919583
[patent_doc_number] => 20150074788
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-12
[patent_title] => 'Firewall Security Between Virtual Devices'
[patent_app_type] => utility
[patent_app_number] => 14/391166
[patent_app_country] => US
[patent_app_date] => 2013-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3994
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14391166
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/391166 | Firewall security between virtual devices | Mar 27, 2013 | Issued |
Array
(
[id] => 9912127
[patent_doc_number] => 20150067330
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-05
[patent_title] => 'METHOD AND SYSTEM FOR NETWORK DATA ACCESS'
[patent_app_type] => utility
[patent_app_number] => 14/389567
[patent_app_country] => US
[patent_app_date] => 2013-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 11313
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14389567
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/389567 | METHOD AND SYSTEM FOR NETWORK DATA ACCESS | Mar 27, 2013 | Abandoned |
Array
(
[id] => 9903778
[patent_doc_number] => 20150058978
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-26
[patent_title] => 'METHOD AND DEVICE FOR PROMPTING INFORMATION ABOUT E-MAIL'
[patent_app_type] => utility
[patent_app_number] => 14/387294
[patent_app_country] => US
[patent_app_date] => 2013-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5734
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14387294
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/387294 | Method and device for prompting information about e-mail | Mar 13, 2013 | Issued |
Array
(
[id] => 10526684
[patent_doc_number] => 09253210
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-02
[patent_title] => 'Policy-based dynamic information flow control on mobile devices'
[patent_app_type] => utility
[patent_app_number] => 13/781823
[patent_app_country] => US
[patent_app_date] => 2013-03-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 7230
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13781823
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/781823 | Policy-based dynamic information flow control on mobile devices | Feb 28, 2013 | Issued |
Array
(
[id] => 8959308
[patent_doc_number] => 08505102
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-08-06
[patent_title] => 'Detecting undesirable content'
[patent_app_type] => utility
[patent_app_number] => 13/740701
[patent_app_country] => US
[patent_app_date] => 2013-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 10429
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13740701
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/740701 | Detecting undesirable content | Jan 13, 2013 | Issued |
Array
(
[id] => 11552672
[patent_doc_number] => 09621540
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-11
[patent_title] => 'Secure provisioning of computing devices for enterprise connectivity'
[patent_app_type] => utility
[patent_app_number] => 13/723890
[patent_app_country] => US
[patent_app_date] => 2012-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 11284
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 257
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13723890
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/723890 | Secure provisioning of computing devices for enterprise connectivity | Dec 20, 2012 | Issued |
Array
(
[id] => 10509129
[patent_doc_number] => 09237007
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-12
[patent_title] => 'Secure modulation and demodulation'
[patent_app_type] => utility
[patent_app_number] => 13/725829
[patent_app_country] => US
[patent_app_date] => 2012-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 14
[patent_no_of_words] => 3787
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13725829
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/725829 | Secure modulation and demodulation | Dec 20, 2012 | Issued |
Array
(
[id] => 9560116
[patent_doc_number] => 20140177828
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-26
[patent_title] => 'MANAGED SECURE COMPUTATIONS ON ENCRYPTED DATA'
[patent_app_type] => utility
[patent_app_number] => 13/723879
[patent_app_country] => US
[patent_app_date] => 2012-12-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9249
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13723879
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/723879 | Managed secure computations on encrypted data | Dec 20, 2012 | Issued |
Array
(
[id] => 12203327
[patent_doc_number] => 09906409
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-27
[patent_title] => 'Method and devices for running push-button configuration sessions'
[patent_app_type] => utility
[patent_app_number] => 14/364939
[patent_app_country] => US
[patent_app_date] => 2012-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 17
[patent_no_of_words] => 12065
[patent_no_of_claims] => 38
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 299
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14364939
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/364939 | Method and devices for running push-button configuration sessions | Dec 11, 2012 | Issued |
Array
(
[id] => 9897399
[patent_doc_number] => 20150052598
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-19
[patent_title] => 'SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TICKET AUTHORIZATION'
[patent_app_type] => utility
[patent_app_number] => 14/363292
[patent_app_country] => US
[patent_app_date] => 2012-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8468
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14363292
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/363292 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TICKET AUTHORIZATION | Dec 10, 2012 | Abandoned |
Array
(
[id] => 8769635
[patent_doc_number] => 20130097672
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-04-18
[patent_title] => 'Security Interface for a Mobile Device'
[patent_app_type] => utility
[patent_app_number] => 13/707103
[patent_app_country] => US
[patent_app_date] => 2012-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4824
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13707103
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/707103 | Security interface for a mobile device | Dec 5, 2012 | Issued |
Array
(
[id] => 10239976
[patent_doc_number] => 20150124970
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-07
[patent_title] => 'KEY NEGOTIATION METHOD AND APPARATUS ACCORDING TO SM2 KEY EXCHANGE PROTOCOL'
[patent_app_type] => utility
[patent_app_number] => 14/361750
[patent_app_country] => US
[patent_app_date] => 2012-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5951
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14361750
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/361750 | Key negotiation method and apparatus according to SM2 key exchange protocol | Nov 25, 2012 | Issued |
Array
(
[id] => 10344635
[patent_doc_number] => 20150229641
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-13
[patent_title] => 'MIGRATION OF A SECURITY POLICY OF A VIRTUAL MACHINE'
[patent_app_type] => utility
[patent_app_number] => 14/372727
[patent_app_country] => US
[patent_app_date] => 2012-11-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3790
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14372727
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/372727 | MIGRATION OF A SECURITY POLICY OF A VIRTUAL MACHINE | Nov 25, 2012 | Abandoned |