Gary F Paumen
Examiner (ID: 13900, Phone: (571)272-2013 , Office: P/2833 )
Most Active Art Unit | 2833 |
Art Unit(s) | 2832, 2834, 3202, 2899, 2833, 0 |
Total Applications | 6904 |
Issued Applications | 5949 |
Pending Applications | 235 |
Abandoned Applications | 720 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 8728330
[patent_doc_number] => 08407471
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-03-26
[patent_title] => 'Selecting a network service for communicating with a server'
[patent_app_type] => utility
[patent_app_number] => 12/862092
[patent_app_country] => US
[patent_app_date] => 2010-08-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4602
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12862092
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/862092 | Selecting a network service for communicating with a server | Aug 23, 2010 | Issued |
Array
(
[id] => 9302374
[patent_doc_number] => 08650619
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-11
[patent_title] => 'Method and apparatus of automated discovery in a communication network'
[patent_app_type] => utility
[patent_app_number] => 12/859503
[patent_app_country] => US
[patent_app_date] => 2010-08-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 8737
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12859503
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/859503 | Method and apparatus of automated discovery in a communication network | Aug 18, 2010 | Issued |
Array
(
[id] => 7786012
[patent_doc_number] => 20120047568
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-23
[patent_title] => 'Digital Asset Management on the Internet'
[patent_app_type] => utility
[patent_app_number] => 12/858410
[patent_app_country] => US
[patent_app_date] => 2010-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5450
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0047/20120047568.pdf
[firstpage_image] =>[orig_patent_app_number] => 12858410
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/858410 | Digital Asset Management on the Internet | Aug 16, 2010 | Abandoned |
Array
(
[id] => 7780810
[patent_doc_number] => 20120042366
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-02-16
[patent_title] => 'SECURE AND USABLE AUTHENTICATION FOR HEALTH CARE INFORMATION ACCESS'
[patent_app_type] => utility
[patent_app_number] => 12/855855
[patent_app_country] => US
[patent_app_date] => 2010-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5970
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0042/20120042366.pdf
[firstpage_image] =>[orig_patent_app_number] => 12855855
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/855855 | Secure and usable authentication for health care information access | Aug 12, 2010 | Issued |
Array
(
[id] => 10190302
[patent_doc_number] => 09219734
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-22
[patent_title] => 'Method and system for automatically detecting media and implementing interaction control thereon'
[patent_app_type] => utility
[patent_app_number] => 12/854043
[patent_app_country] => US
[patent_app_date] => 2010-08-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 30
[patent_figures_cnt] => 30
[patent_no_of_words] => 43662
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12854043
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/854043 | Method and system for automatically detecting media and implementing interaction control thereon | Aug 9, 2010 | Issued |
Array
(
[id] => 8360881
[patent_doc_number] => 20120216039
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-08-23
[patent_title] => 'Method and Apparatus for Source Identification for Key Handling Following a Han-Dover Failure'
[patent_app_type] => utility
[patent_app_number] => 13/500243
[patent_app_country] => US
[patent_app_date] => 2010-07-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7985
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13500243
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/500243 | Method and apparatus for source identification for key handling following a handover failure | Jul 27, 2010 | Issued |
Array
(
[id] => 7746867
[patent_doc_number] => 20120023324
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-01-26
[patent_title] => 'INSIDER THREAT CORRELATION TOOL'
[patent_app_type] => utility
[patent_app_number] => 12/841323
[patent_app_country] => US
[patent_app_date] => 2010-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8838
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0023/20120023324.pdf
[firstpage_image] =>[orig_patent_app_number] => 12841323
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/841323 | Insider threat correlation tool | Jul 21, 2010 | Issued |
Array
(
[id] => 7671872
[patent_doc_number] => 20110321141
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-29
[patent_title] => 'NETWORK DEVICES WITH LOG-ON INTERFACES'
[patent_app_type] => utility
[patent_app_number] => 12/839147
[patent_app_country] => US
[patent_app_date] => 2010-07-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7428
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12839147
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/839147 | NETWORK DEVICES WITH LOG-ON INTERFACES | Jul 18, 2010 | Abandoned |
Array
(
[id] => 8633143
[patent_doc_number] => 08365243
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-01-29
[patent_title] => 'Image leak prevention using geotagging'
[patent_app_type] => utility
[patent_app_number] => 12/835763
[patent_app_country] => US
[patent_app_date] => 2010-07-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 7150
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12835763
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/835763 | Image leak prevention using geotagging | Jul 13, 2010 | Issued |
Array
(
[id] => 6133693
[patent_doc_number] => 20110007893
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-13
[patent_title] => 'METHOD AND APPARATUS FOR FINGERPRINTING AND COPY PROTECTING OPTICAL RECORDING MEDIA'
[patent_app_type] => utility
[patent_app_number] => 12/831518
[patent_app_country] => US
[patent_app_date] => 2010-07-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5584
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0007/20110007893.pdf
[firstpage_image] =>[orig_patent_app_number] => 12831518
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/831518 | METHOD AND APPARATUS FOR FINGERPRINTING AND COPY PROTECTING OPTICAL RECORDING MEDIA | Jul 6, 2010 | Abandoned |
Array
(
[id] => 7714194
[patent_doc_number] => 20120005480
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-01-05
[patent_title] => 'METHODS FOR FIRMWARE SIGNATURE'
[patent_app_type] => utility
[patent_app_number] => 12/829261
[patent_app_country] => US
[patent_app_date] => 2010-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5394
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0005/20120005480.pdf
[firstpage_image] =>[orig_patent_app_number] => 12829261
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/829261 | Methods for firmware signature | Jun 30, 2010 | Issued |
Array
(
[id] => 6100781
[patent_doc_number] => 20110004928
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-06
[patent_title] => 'PASSWORD INPUT SYSTEM USING ALPHANUMERIC MATRICES AND PASSWORD INPUT METHOD USING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 12/824761
[patent_app_country] => US
[patent_app_date] => 2010-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 7861
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0004/20110004928.pdf
[firstpage_image] =>[orig_patent_app_number] => 12824761
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/824761 | Password input system using alphanumeric matrices and password input method using the same | Jun 27, 2010 | Issued |
Array
(
[id] => 7668566
[patent_doc_number] => 20110317835
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-29
[patent_title] => 'Method and Apparatus to Facilitate Wireline Transmission of an Encrypted Rolling Code'
[patent_app_type] => utility
[patent_app_number] => 12/822499
[patent_app_country] => US
[patent_app_date] => 2010-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 9650
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12822499
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/822499 | Method and Apparatus to Facilitate Wireline Transmission of an Encrypted Rolling Code | Jun 23, 2010 | Abandoned |
Array
(
[id] => 6339220
[patent_doc_number] => 20100199337
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-05
[patent_title] => 'SYSTEM AND METHOD FOR ESTABLISHING AND AUTHORIZING A SECURITY CODE'
[patent_app_type] => utility
[patent_app_number] => 12/758489
[patent_app_country] => US
[patent_app_date] => 2010-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 5929
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0199/20100199337.pdf
[firstpage_image] =>[orig_patent_app_number] => 12758489
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/758489 | SYSTEM AND METHOD FOR ESTABLISHING AND AUTHORIZING A SECURITY CODE | Apr 11, 2010 | Abandoned |
Array
(
[id] => 6337720
[patent_doc_number] => 20100199100
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-05
[patent_title] => 'Secure Access by a User to a Resource'
[patent_app_type] => utility
[patent_app_number] => 12/696310
[patent_app_country] => US
[patent_app_date] => 2010-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10027
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0199/20100199100.pdf
[firstpage_image] =>[orig_patent_app_number] => 12696310
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/696310 | Secure Access by a User to a Resource | Jan 28, 2010 | Abandoned |
Array
(
[id] => 8632886
[patent_doc_number] => 08364985
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-01-29
[patent_title] => 'Buffer-caches for caching encrypted data via copy-on-encrypt'
[patent_app_type] => utility
[patent_app_number] => 12/636536
[patent_app_country] => US
[patent_app_date] => 2009-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4602
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12636536
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/636536 | Buffer-caches for caching encrypted data via copy-on-encrypt | Dec 10, 2009 | Issued |
Array
(
[id] => 6452620
[patent_doc_number] => 20100169970
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-01
[patent_title] => 'SYSTEM AND METHODS FOR DETECTING MALICIOUS EMAIL TRANSMISSION'
[patent_app_type] => utility
[patent_app_number] => 12/633493
[patent_app_country] => US
[patent_app_date] => 2009-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 12024
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0169/20100169970.pdf
[firstpage_image] =>[orig_patent_app_number] => 12633493
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/633493 | System and methods for detecting malicious email transmission | Dec 7, 2009 | Issued |
Array
(
[id] => 9358889
[patent_doc_number] => 08677445
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-18
[patent_title] => 'Information processing apparatus and computer readable medium'
[patent_app_type] => utility
[patent_app_number] => 12/631648
[patent_app_country] => US
[patent_app_date] => 2009-12-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 13
[patent_no_of_words] => 8851
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 164
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12631648
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/631648 | Information processing apparatus and computer readable medium | Dec 3, 2009 | Issued |
Array
(
[id] => 6218326
[patent_doc_number] => 20110138465
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-09
[patent_title] => 'MITIGATING MALICIOUS FILE PROPAGATION WITH PROGRESSIVE IDENTIFIERS'
[patent_app_type] => utility
[patent_app_number] => 12/629941
[patent_app_country] => US
[patent_app_date] => 2009-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 11481
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0138/20110138465.pdf
[firstpage_image] =>[orig_patent_app_number] => 12629941
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/629941 | Mitigating malicious file propagation with progressive identifiers | Dec 2, 2009 | Issued |
Array
(
[id] => 8472702
[patent_doc_number] => 08301895
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-10-30
[patent_title] => 'Identity based network policy enablement'
[patent_app_type] => utility
[patent_app_number] => 12/629059
[patent_app_country] => US
[patent_app_date] => 2009-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 22
[patent_no_of_words] => 17598
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 274
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12629059
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/629059 | Identity based network policy enablement | Dec 1, 2009 | Issued |