USPTO Examiner BROWN CHRISTOPHER J - Art Unit 2439

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18774270CYBERSECURITY THREAT HUNTINGJuly 2024June 2025Abandon1110NoNo
18639422COLLABORATIVE COMMUNICATIONS ENVIRONMENT AND PRIVACY SETTING ASSOCIATED THEREWITHApril 2024May 2025Allow1320YesNo
18624274Method for Automating Security Architecture Reviews and AssessmentsApril 2024June 2025Abandon1510NoNo
18440800MALICIOUS HOMOGLYPHIC DOMAIN NAME DETECTION AND ASSOCIATED CYBER SECURITY APPLICATIONSFebruary 2024August 2024Allow610YesNo
18420638DETECTION OF UNKNOWN APPLICATIONSJanuary 2024November 2024Allow1020YesNo
18396581Distributed Routing and Load Balancing in a Dynamic Service ChainDecember 2023May 2025Allow1610NoNo
18572915COMPUTER-IMPLEMENTED METHOD FOR COMPUTING UNBALANCED L-TREES EFFICIENTLY FOR HASH-BASED SIGNATURES USED IN POST-QUANTUM CRYPTOGRAPHIC AUTHENTICATIONDecember 2023December 2024Allow1210NoNo
18222901MALICIOUS HOMOGLYPHIC DOMAIN NAME DETECTION AND ASSOCIATED CYBER SECURITY APPLICATIONSJuly 2023November 2023Allow400NoNo
18334244SYSTEMS AND METHODS TO PROVIDE INFORMATION SECURITY BY CONDUCTING A PHISHING VULNERABILITY ASSESSMENTJune 2023May 2024Allow1120YesNo
18128789INLINE RANSOMWARE DETECTION VIA SERVER MESSAGE BLOCK (SMB) TRAFFICMarch 2023March 2025Allow2350YesNo
18027855DETECTION OF ALTERED DOCUMENTSMarch 2023December 2024Allow2120YesNo
18187969SYSTEM AND METHOD FOR DEVICE AUTHENTICATION IN A DISTRIBUTED ENVIRONMENT WITHOUT USER INTERVENTIONMarch 2023March 2025Allow2400NoNo
18122953Offensive Cybersecurity ApplianceMarch 2023January 2025Allow2230YesNo
18108523METHODS, APPARATUSES, COMPUTER PROGRAMS AND CARRIERS FOR SECURITY MANAGEMENT BEFORE HANDOVER FROM 5G TO 4G SYSTEMFebruary 2023December 2023Allow1000NoNo
18107006COORDINATING MAINTENANCE MANAGEMENT OPERATIONS VIA A SECURE DEPLOYMENT SYSTEMFebruary 2023January 2024Allow1210YesNo
18152343CONTROLLING ACCESS TO CLOUD RESOURCES IN DATA USING CLOUD-ENABLED DATA TAGGING AND A DYNAMIC ACCESS CONTROL POLICY ENGINEJanuary 2023September 2024Abandon2020YesNo
18058324REGION-BASED AUTHENTICATION AND ACCESS POLICIES FOR SERVICESNovember 2022June 2025Abandon3120YesNo
17954314SYSTEM FOR PRIVATELY SHARING VERIFIED VIDEOSeptember 2022February 2025Allow2920NoNo
17953028MULTIFACTOR AUTHENTICATION VIA BIFURCATED PASSCODE AND NON-FUNGIBLE TOKENSeptember 2022May 2025Allow3200NoNo
17946900MALICIOUS HOMOGLYPHIC DOMAIN NAME DETECTION AND ASSOCIATED CYBER SECURITY APPLICATIONSSeptember 2022April 2023Allow710YesNo
17802429Method and System for Detecting Data Traffic in a Communication NetworkAugust 2022August 2024Allow2450YesNo
17888422EXTENDED BROWSER MONITORING INBOUND CONNECTION REQUESTS FOR AGENTLESS LATERAL MOVEMENT PROTECTION FROM RANSOMWARE FOR ENDPOINTS DEPLOYED UNDER A DEFAULT GATEWAY WITH POINT TO POINT LINKSAugust 2022April 2023Allow810YesNo
17887389DHCP SERVER-BASED STEERING LOGIC FOR POLICY ENFORCEMENT ON IoT DEVICESAugust 2022August 2023Allow1220YesNo
17869902System and Method for Fabric-Independent In-Band Privacy for Security Commands on Non-volatile Memory Express Over Fabrics (NVMe-oF)July 2022April 2025Allow3330YesNo
17870419METHOD AND APPARATUS FOR CREATING A MALWARE DETECTION DATASETJuly 2022April 2025Allow3310YesNo
17867574ELECTRONIC TRANSACTION SECURITY SYSTEM AND METHODJuly 2022December 2023Allow1710NoNo
17861559Systems and methods for monitoring for and lowering the risk of addiction-related or restriction violation-related behavior(s)July 2022May 2025Allow3410YesNo
17750640Scored threat signature analysisMay 2022January 2024Allow2010YesNo
17745250ARTIFICIAL INTELLIGENCE CYBER SECURITY ANALYSTMay 2022May 2025Allow3630NoNo
17736507MALWARE DETECTORMay 2022October 2023Allow1710NoNo
17661762NETWORK NODE IDENTIFICATION USING WIRELESS SIGNAL SIGNATURESMay 2022July 2024Allow2710NoNo
17732358ROGUE DEVICE DETECTION INCLUDING MAC ADDRESS SPOOFING DETECTIONApril 2022March 2024Allow2220YesNo
17707088AUTOMATED AND CONTINUOUS CYBERSECURITY ASSESSMENT WITH MEASUREMENT AND SCORINGMarch 2022March 2024Abandon2320NoNo
17703957ENHANCING NETWORK SECURITYMarch 2022July 2023Allow1620YesNo
17703959ENHANCING NETWORK SECURITYMarch 2022October 2023Allow1920YesNo
17703964ENHANCING NETWORK SECURITYMarch 2022October 2023Allow1920YesNo
17762738SYSTEMS AND METHODS FOR NETWORK CHANGES TO A COMPUTERIZED NETWORKMarch 2022June 2025Abandon3820YesNo
17701654ENHANCING NETWORK SECURITYMarch 2022May 2023Allow1430YesNo
17690456LATERAL MOVEMENT FACILITATION OF MALICIOUS ATTACKS USING HONEYPOTSMarch 2022September 2024Allow3040NoNo
17584671SECURE SERVER CLIENT INTERACTIONJanuary 2022December 2024Allow5320YesNo
17572564SYSTEM AND METHOD FOR DATA ACCESS FROM AN AIRCRAFTJanuary 2022November 2024Abandon3420NoNo
17567388SECURE COMPUTING HARDWARE APPARATUSJanuary 2022July 2023Allow1830YesNo
17560036REAL TIME DYNAMIC CLIENT ACCESS CONTROLDecember 2021May 2024Allow2920YesNo
17517371User Responses to Cyber Security ThreatsNovember 2021January 2023Allow1510NoNo
17516063MODIFYING TRIAGE INFORMATION BASED ON NETWORK MONITORINGNovember 2021January 2025Allow3960YesNo
17508888APPARATUS AND METHOD FOR COMMUNICATING DATA IN IN-VEHICLE NETWORK BASED ON AUTOMOTIVE ETHERNETOctober 2021August 2024Abandon3310NoNo
17507988SYSTEM FOR PERSONAL AUTHENTICATION AND WEBSITE LOGIN USING USBOctober 2021May 2024Abandon3110NoNo
17501029APPARATUS AND METHODS FOR SECURE, DISTRIBUTED, AUGMENTED-REALITY (AR) COMMUNICATION SYSTEMSOctober 2021March 2024Allow2920YesNo
17474606REAL-TIME FRAUD DETECTION IN VOICE BIOMETRIC SYSTEMS USING REPETITIVE PHRASES IN FRAUDSTER VOICE PRINTSSeptember 2021May 2024Allow3210YesNo
17461546METHODS AND SYSTEMS FOR AUTOMATING CYBERSECURITY REVIEWS OF IT SYSTEMS, IT ASSETS, AND THEIR OPERATING ENVIRONMENTSAugust 2021April 2024Abandon3110NoNo
17409436AUTOMATED AND CONTINUOUS CYBERSECURITY ASSESSMENT WITH MEASUREMENT AND SCORINGAugust 2021February 2022Allow610NoNo
17403996Authorization-Based Behaviometric IdentificationAugust 2021March 2022Allow710NoNo
17351569PRIVACY PRESERVING ENSEMBLE LEARNING AS A SERVICEJune 2021August 2024Allow3820NoNo
17347777SYSTEMS AND METHODS FOR NETWORK RISK MANAGEMENT, CYBER RISK MANAGEMENT, SECURITY RATINGS, AND EVALUATION SYSTEMS AND METHODS OF THE SAMEJune 2021February 2024Allow3210YesNo
17342451SOFTWARE PROVENANCE VALIDATIONJune 2021August 2024Allow3910NoNo
17319406HOLISTIC ASSESSMENT, MONITORING, AND MANAGEMENT OF DIGITAL PRESENCEMay 2021December 2023Allow3120YesNo
17245991Anchor Key Generation Method, Device, and SystemApril 2021October 2023Allow3020YesNo
17244225NETWORK ATTACK DEFENSE METHOD, APPARATUS, DEVICE, SYSTEM AND STORAGE MEDIUMApril 2021August 2024Abandon4010NoNo
17286584PROTECTED PERIPHERAL PORTSApril 2021November 2024Allow4330YesNo
17231366DISTRIBUTED ROUTING AND LOAD BALANCING IN A DYNAMIC SERVICE CHAINApril 2021August 2023Allow2820YesNo
17227927SYSTEM AND METHOD FOR SIGNATURE PATHWAY AUTHENTICATION AND IDENTIFICATIONApril 2021February 2023Abandon2220NoNo
17201762SYSTEMS AND METHODS FOR ASSESSING SOFTWARE VULNERABILITIES THROUGH A COMBINATION OF EXTERNAL THREAT INTELLIGENCE AND INTERNAL ENTERPRISE INFORMATION TECHNOLOGY DATAMarch 2021August 2022Abandon1700NoNo
17275870INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAMMarch 2021August 2024Allow4130YesNo
17196048DATA PROVIDING SERVER DEVICE AND DATA PROVIDING METHODMarch 2021April 2025Abandon4920NoNo
17184001COLLABORATIVE COMMUNICATIONS ENVIRONMENT AND PRIVACY SETTING ASSOCIATED THEREWITHFebruary 2021December 2023Allow3440YesNo
17162715SECURITY CONTEXT HANDLING IN 5G DURING HANDOVERJanuary 2021April 2021Allow210NoNo
17149862ARTIFICIAL INTELLIGENCE CORROBORATION OF VENDOR OUTPUTSJanuary 2021August 2024Allow4330YesNo
17253547SYSTEM FOR TECHNOLOGY INFRASTRUCTURE ANALYSISDecember 2020October 2023Abandon3410NoNo
17122765REAL TIME APPLICATION PROTECTION SYSTEM ATTACK MONITORING AND PATCHINGDecember 2020June 2024Abandon4240YesNo
17121971IDENTITY MANAGEMENT SERVICE USING A BLOCKCHAIN PROVIDING CERTIFYING TRANSACTIONS BETWEEN DEVICESDecember 2020October 2023Abandon3420NoNo
17103963DYNAMICALLY ANALYZING THIRD-PARTY APPLICATION WEBSITE CERTIFICATES ACROSS USERS TO DETECT MALICIOUS ACTIVITYNovember 2020October 2023Abandon3520NoNo
17100983MULTI-TENANT SECURITY IN THE CLOUDNovember 2020April 2025Allow5340YesNo
17088007REGISTRY BLOCKCHAIN ARCHITECTURENovember 2020November 2023Allow3610YesNo
17083910MALICIOUS DATA SCAN SERVICEOctober 2020September 2023Abandon3420YesNo
17082813SECURITY DETECTION METHOD, DEVICE, AND APPARATUSOctober 2020August 2021Allow920YesNo
17081237Anonymization of Medical Image DataOctober 2020October 2024Abandon4720YesNo
17079682INFORMATION PROCESSING DEVICE AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUMOctober 2020March 2023Allow2920NoNo
17078603CONTEXT BASED RISK ASSESSMENT OF A COMPUTING RESOURCE VULNERABILITYOctober 2020February 2024Allow3910YesNo
17039009ENHANCED RISK ASSESSMENTSeptember 2020April 2025Allow5460YesYes
17032618DATA COMMUNICATION CONTROL DEVICE, NON-VOLATILE MEMORY, AND VEHICLE CONTROL SYSTEMSeptember 2020May 2025Abandon5530YesNo
17016078THREAT MITIGATION SYSTEM AND METHODSeptember 2020August 2022Allow2360NoNo
17008233SECURITY PLATFORM WITH EXTERNAL INLINE PROCESSING OF ASSEMBLED SELECTED TRAFFICAugust 2020September 2024Allow4960YesNo
16945863SINGLE SIGN-IN FOR IOT DEVICESAugust 2020February 2024Allow4310YesNo
16944233METHOD AND SYSTEM FOR A SECURITY ASSESSMENT OF PHYSICAL ASSETS USING PHYSICAL ASSET STATE INFORMATIONJuly 2020December 2023Abandon4140YesNo
16945180METHOD TO RATE THE SECURITY OF A DEVICE THROUGH FINGERPRINT ANALYSISJuly 2020May 2024Abandon4630YesNo
16966806IN-VEHICLE APPARATUS AND INCIDENT MONITORING METHODJuly 2020November 2023Allow4010YesNo
16922589QUANTUM RESISTANT BLOCKCHAIN WITH MULTI-DIMENSIONAL QUANTUM KEY DISTRIBUTIONJuly 2020February 2023Allow3110NoNo
16914599DETECTING SECURITY THREATS IN STORAGE SYSTEMS USING ARTIFICIAL INTELLIGENCE TECHNIQUESJune 2020July 2022Allow2510YesNo
16770290METHOD AND CONFIRMATION DEVICE FOR CONFIRMING THE INTEGRITY OF A SYSTEMJune 2020March 2022Allow2250YesNo
16882367CYBER ATTACK COVERAGEMay 2020April 2024Abandon4740YesNo
16875965System, Apparatus And Method for Anonymizing Data Prior To Threat Detection AnalysisMay 2020March 2021Allow1010NoNo
16867642DYNAMICALLY TAILORED TRUST FOR SECURE APPLICATION-SERVICE NETWORKING IN AN ENTERPRISEMay 2020August 2023Allow3960YesNo
16864869Visualized Penetration Testing (VPEN)May 2020December 2022Abandon3110NoNo
16862135Automated Security Analysis of Software LibrariesApril 2020September 2023Allow4130YesNo
16859897Assessing Computer Network RiskApril 2020June 2023Allow3730NoNo
16849066ON-DEMAND SOFTWARE-DEFINED SECURITY SERVICE ORCHESTRATION FOR A 5G WIRELESS NETWORKApril 2020June 2023Allow3810YesNo
16849158ON-DEMAND SECURITY LAYER FOR A 5G WIRELESS NETWORKApril 2020July 2023Allow3910NoNo
16844418Method for Unlocking Screen by Using Fingerprint and TerminalApril 2020June 2021Allow1420NoNo
16839120Network exposure detection and security assessment toolApril 2020July 2022Allow2810NoNo
16828529SYSTEMS AND METHODS FOR IDENTIFYING WEBSITE CONTENT MANIPULATIONMarch 2020January 2024Abandon4530YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner BROWN, CHRISTOPHER J.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
31
Examiner Affirmed
25
(80.6%)
Examiner Reversed
6
(19.4%)
Reversal Percentile
29.7%
Lower than average

What This Means

With a 19.4% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
69
Allowed After Appeal Filing
23
(33.3%)
Not Allowed After Appeal Filing
46
(66.7%)
Filing Benefit Percentile
49.4%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 33.3% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner BROWN, CHRISTOPHER J - Prosecution Strategy Guide

Executive Summary

Examiner BROWN, CHRISTOPHER J works in Art Unit 2439 and has examined 633 patent applications in our dataset. With an allowance rate of 76.6%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 34 months.

Allowance Patterns

Examiner BROWN, CHRISTOPHER J's allowance rate of 76.6% places them in the 35% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.

Office Action Patterns

On average, applications examined by BROWN, CHRISTOPHER J receive 2.59 office actions before reaching final disposition. This places the examiner in the 87% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by BROWN, CHRISTOPHER J is 34 months. This places the examiner in the 23% percentile for prosecution speed. Applications take longer to reach final disposition with this examiner compared to most others.

Interview Effectiveness

Conducting an examiner interview provides a +10.4% benefit to allowance rate for applications examined by BROWN, CHRISTOPHER J. This interview benefit is in the 47% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 26.8% of applications are subsequently allowed. This success rate is in the 35% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 27.1% of cases where such amendments are filed. This entry rate is in the 29% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 60.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 48% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 58.1% of appeals filed. This is in the 27% percentile among all examiners. Of these withdrawals, 34.9% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 38.5% are granted (fully or in part). This grant rate is in the 36% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 2.2% of allowed cases (in the 78% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 16% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Expect multiple rounds of prosecution: This examiner issues more office actions than average. Address potential issues proactively in your initial response and consider requesting an interview early in prosecution.
  • Plan for extended prosecution: Applications take longer than average with this examiner. Factor this into your continuation strategy and client communications.
  • Examiner cooperation: This examiner frequently makes examiner's amendments to place applications in condition for allowance. If you are close to allowance, the examiner may help finalize the claims.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.