Search

Christopher J. Brown

Examiner (ID: 10584)

Most Active Art Unit
2439
Art Unit(s)
2134, 2439, 2434
Total Applications
972
Issued Applications
641
Pending Applications
123
Abandoned Applications
224

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 11215576 [patent_doc_number] => 09444625 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-09-13 [patent_title] => 'Systems and methods for authenticating an electronic message' [patent_app_type] => utility [patent_app_number] => 13/936568 [patent_app_country] => US [patent_app_date] => 2013-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 7133 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 149 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13936568 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/936568
Systems and methods for authenticating an electronic message Jul 7, 2013 Issued
Array ( [id] => 10991954 [patent_doc_number] => 20160188899 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-06-30 [patent_title] => 'SECURITY ENHANCEMENT BASED ON USE OF ICONS WITH PASS CODES' [patent_app_type] => utility [patent_app_number] => 14/896559 [patent_app_country] => US [patent_app_date] => 2013-06-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3290 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14896559 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/896559
SECURITY ENHANCEMENT BASED ON USE OF ICONS WITH PASS CODES Jun 11, 2013 Abandoned
Array ( [id] => 9919553 [patent_doc_number] => 20150074758 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-12 [patent_title] => 'METHOD OF USING A MOBILE TERMINAL TO IMPLEMENT CLOUD SEARCHING' [patent_app_type] => utility [patent_app_number] => 14/389559 [patent_app_country] => US [patent_app_date] => 2013-05-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 3491 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14389559 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/389559
Method of using a mobile terminal to implement cloud searching May 27, 2013 Issued
Array ( [id] => 9056815 [patent_doc_number] => 20130254529 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-09-26 [patent_title] => 'METHOD AND APPARATUS FOR PROVIDING A SCALABLE SERVICE PLATFORM USING A NETWORK CACHE' [patent_app_type] => utility [patent_app_number] => 13/874154 [patent_app_country] => US [patent_app_date] => 2013-04-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 8877 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13874154 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/874154
Method and apparatus for providing a scalable service platform using a network cache Apr 29, 2013 Issued
Array ( [id] => 10732055 [patent_doc_number] => 20160078205 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-17 [patent_title] => 'DISPLACEMENT SIGNATURES' [patent_app_type] => utility [patent_app_number] => 14/784667 [patent_app_country] => US [patent_app_date] => 2013-04-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 7568 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14784667 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/784667
DISPLACEMENT SIGNATURES Apr 23, 2013 Abandoned
Array ( [id] => 10732061 [patent_doc_number] => 20160078211 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-17 [patent_title] => 'LOCATION SIGNATURES' [patent_app_type] => utility [patent_app_number] => 14/785433 [patent_app_country] => US [patent_app_date] => 2013-04-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6847 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14785433 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/785433
LOCATION SIGNATURES Apr 23, 2013 Abandoned
Array ( [id] => 10210979 [patent_doc_number] => 20150095971 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-04-02 [patent_title] => 'AUTHENTICATION IN COMPUTER NETWORKS' [patent_app_type] => utility [patent_app_number] => 14/390571 [patent_app_country] => US [patent_app_date] => 2013-04-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 18585 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14390571 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/390571
AUTHENTICATION IN COMPUTER NETWORKS Apr 4, 2013 Abandoned
Array ( [id] => 9919583 [patent_doc_number] => 20150074788 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-12 [patent_title] => 'Firewall Security Between Virtual Devices' [patent_app_type] => utility [patent_app_number] => 14/391166 [patent_app_country] => US [patent_app_date] => 2013-03-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 3994 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14391166 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/391166
Firewall security between virtual devices Mar 27, 2013 Issued
Array ( [id] => 9912127 [patent_doc_number] => 20150067330 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-05 [patent_title] => 'METHOD AND SYSTEM FOR NETWORK DATA ACCESS' [patent_app_type] => utility [patent_app_number] => 14/389567 [patent_app_country] => US [patent_app_date] => 2013-03-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 11313 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14389567 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/389567
METHOD AND SYSTEM FOR NETWORK DATA ACCESS Mar 27, 2013 Abandoned
Array ( [id] => 9903778 [patent_doc_number] => 20150058978 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-26 [patent_title] => 'METHOD AND DEVICE FOR PROMPTING INFORMATION ABOUT E-MAIL' [patent_app_type] => utility [patent_app_number] => 14/387294 [patent_app_country] => US [patent_app_date] => 2013-03-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5734 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14387294 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/387294
Method and device for prompting information about e-mail Mar 13, 2013 Issued
Array ( [id] => 10526684 [patent_doc_number] => 09253210 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-02-02 [patent_title] => 'Policy-based dynamic information flow control on mobile devices' [patent_app_type] => utility [patent_app_number] => 13/781823 [patent_app_country] => US [patent_app_date] => 2013-03-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 7 [patent_no_of_words] => 7230 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 190 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13781823 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/781823
Policy-based dynamic information flow control on mobile devices Feb 28, 2013 Issued
Array ( [id] => 8959308 [patent_doc_number] => 08505102 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-08-06 [patent_title] => 'Detecting undesirable content' [patent_app_type] => utility [patent_app_number] => 13/740701 [patent_app_country] => US [patent_app_date] => 2013-01-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 10429 [patent_no_of_claims] => 23 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 103 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13740701 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/740701
Detecting undesirable content Jan 13, 2013 Issued
Array ( [id] => 11552672 [patent_doc_number] => 09621540 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-04-11 [patent_title] => 'Secure provisioning of computing devices for enterprise connectivity' [patent_app_type] => utility [patent_app_number] => 13/723890 [patent_app_country] => US [patent_app_date] => 2012-12-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 11284 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 257 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13723890 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/723890
Secure provisioning of computing devices for enterprise connectivity Dec 20, 2012 Issued
Array ( [id] => 10509129 [patent_doc_number] => 09237007 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-01-12 [patent_title] => 'Secure modulation and demodulation' [patent_app_type] => utility [patent_app_number] => 13/725829 [patent_app_country] => US [patent_app_date] => 2012-12-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 14 [patent_no_of_words] => 3787 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 95 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13725829 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/725829
Secure modulation and demodulation Dec 20, 2012 Issued
Array ( [id] => 9560116 [patent_doc_number] => 20140177828 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-06-26 [patent_title] => 'MANAGED SECURE COMPUTATIONS ON ENCRYPTED DATA' [patent_app_type] => utility [patent_app_number] => 13/723879 [patent_app_country] => US [patent_app_date] => 2012-12-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9249 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13723879 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/723879
Managed secure computations on encrypted data Dec 20, 2012 Issued
Array ( [id] => 12203327 [patent_doc_number] => 09906409 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-02-27 [patent_title] => 'Method and devices for running push-button configuration sessions' [patent_app_type] => utility [patent_app_number] => 14/364939 [patent_app_country] => US [patent_app_date] => 2012-12-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 17 [patent_no_of_words] => 12065 [patent_no_of_claims] => 38 [patent_no_of_ind_claims] => 9 [patent_words_short_claim] => 299 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14364939 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/364939
Method and devices for running push-button configuration sessions Dec 11, 2012 Issued
Array ( [id] => 9897399 [patent_doc_number] => 20150052598 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-19 [patent_title] => 'SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TICKET AUTHORIZATION' [patent_app_type] => utility [patent_app_number] => 14/363292 [patent_app_country] => US [patent_app_date] => 2012-12-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 8468 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14363292 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/363292
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TICKET AUTHORIZATION Dec 10, 2012 Abandoned
Array ( [id] => 8769635 [patent_doc_number] => 20130097672 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-04-18 [patent_title] => 'Security Interface for a Mobile Device' [patent_app_type] => utility [patent_app_number] => 13/707103 [patent_app_country] => US [patent_app_date] => 2012-12-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4824 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13707103 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/707103
Security interface for a mobile device Dec 5, 2012 Issued
Array ( [id] => 10239976 [patent_doc_number] => 20150124970 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-05-07 [patent_title] => 'KEY NEGOTIATION METHOD AND APPARATUS ACCORDING TO SM2 KEY EXCHANGE PROTOCOL' [patent_app_type] => utility [patent_app_number] => 14/361750 [patent_app_country] => US [patent_app_date] => 2012-11-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5951 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14361750 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/361750
Key negotiation method and apparatus according to SM2 key exchange protocol Nov 25, 2012 Issued
Array ( [id] => 10344635 [patent_doc_number] => 20150229641 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-08-13 [patent_title] => 'MIGRATION OF A SECURITY POLICY OF A VIRTUAL MACHINE' [patent_app_type] => utility [patent_app_number] => 14/372727 [patent_app_country] => US [patent_app_date] => 2012-11-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3790 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14372727 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/372727
MIGRATION OF A SECURITY POLICY OF A VIRTUAL MACHINE Nov 25, 2012 Abandoned
Menu