Search

Ian G. Paquette

Examiner (ID: 629, Phone: (571)270-5568 , Office: P/3753 )

Most Active Art Unit
3753
Art Unit(s)
3753
Total Applications
483
Issued Applications
364
Pending Applications
0
Abandoned Applications
119

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 13753321 [patent_doc_number] => 10169608 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-01-01 [patent_title] => Dynamic management of data with context-based processing [patent_app_type] => utility [patent_app_number] => 15/154811 [patent_app_country] => US [patent_app_date] => 2016-05-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 12914 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 232 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15154811 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/154811
Dynamic management of data with context-based processing May 12, 2016 Issued
Array ( [id] => 14127481 [patent_doc_number] => 10250619 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2019-04-02 [patent_title] => Overlay cyber security networked system and method [patent_app_type] => utility [patent_app_number] => 15/154469 [patent_app_country] => US [patent_app_date] => 2016-05-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 29246 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 356 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15154469 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/154469
Overlay cyber security networked system and method May 12, 2016 Issued
Array ( [id] => 11340389 [patent_doc_number] => 20160366146 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-12-15 [patent_title] => 'SYSTEM ACCOUNT ACCESS MANAGER' [patent_app_type] => utility [patent_app_number] => 15/151497 [patent_app_country] => US [patent_app_date] => 2016-05-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3125 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15151497 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/151497
System account access manager May 10, 2016 Issued
Array ( [id] => 12055495 [patent_doc_number] => 20170331839 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-11-16 [patent_title] => 'CYBER-SECURITY PRESENCE MONITORING AND ASSESSMENT' [patent_app_type] => utility [patent_app_number] => 15/150955 [patent_app_country] => US [patent_app_date] => 2016-05-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7180 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15150955 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/150955
Cyber-security presence monitoring and assessment May 9, 2016 Issued
Array ( [id] => 13269243 [patent_doc_number] => 10146706 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-12-04 [patent_title] => Data security system [patent_app_type] => utility [patent_app_number] => 15/137897 [patent_app_country] => US [patent_app_date] => 2016-04-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 14 [patent_figures_cnt] => 22 [patent_no_of_words] => 10317 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 180 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15137897 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/137897
Data security system Apr 24, 2016 Issued
Array ( [id] => 11035100 [patent_doc_number] => 20160232056 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-11 [patent_title] => 'REPRODUCING DATA FROM OBFUSCATED DATA RETRIEVED FROM A DISPERSED STORAGE NETWORK' [patent_app_type] => utility [patent_app_number] => 15/131488 [patent_app_country] => US [patent_app_date] => 2016-04-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 21 [patent_no_of_words] => 20606 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15131488 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/131488
Reproducing data from obfuscated data retrieved from a dispersed storage network Apr 17, 2016 Issued
Array ( [id] => 15367875 [patent_doc_number] => 20200019702 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-16 [patent_title] => A HYBRID APPROACH OF MALWARE DETECTION [patent_app_type] => utility [patent_app_number] => 16/088136 [patent_app_country] => US [patent_app_date] => 2016-03-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 8382 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16088136 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/088136
A HYBRID APPROACH OF MALWARE DETECTION Mar 24, 2016 Abandoned
Array ( [id] => 10793899 [patent_doc_number] => 20160140056 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-05-19 [patent_title] => 'METHODS TO IMPROVE SECURE FLASH PROGRAMMING' [patent_app_type] => utility [patent_app_number] => 15/000785 [patent_app_country] => US [patent_app_date] => 2016-01-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4441 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15000785 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/000785
METHODS TO IMPROVE SECURE FLASH PROGRAMMING Jan 18, 2016 Abandoned
Array ( [id] => 13739699 [patent_doc_number] => 20180374319 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-12-27 [patent_title] => A DEVICE FOR DETECTION THE FOREIGN OBJECTS PLACED, JAMMING THE DATA WITH DISRUPTIVE SIGNALS, ISSUING WARNING NOTICES AND RECORDING THE EVENTS IN ORDER TO PROTECT THE DATA ON THE CARDS USED IN THE PAYMENT STATIONS [patent_app_type] => utility [patent_app_number] => 16/062222 [patent_app_country] => US [patent_app_date] => 2015-12-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2566 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 78 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16062222 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/062222
A DEVICE FOR DETECTION THE FOREIGN OBJECTS PLACED, JAMMING THE DATA WITH DISRUPTIVE SIGNALS, ISSUING WARNING NOTICES AND RECORDING THE EVENTS IN ORDER TO PROTECT THE DATA ON THE CARDS USED IN THE PAYMENT STATIONS Dec 30, 2015 Abandoned
Array ( [id] => 10771364 [patent_doc_number] => 20160117520 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-04-28 [patent_title] => 'METHOD AND SYSTEM FOR SHARING CONTENT FILES USING A COMPUTER SYSTEM AND DATA NETWORK' [patent_app_type] => utility [patent_app_number] => 14/973606 [patent_app_country] => US [patent_app_date] => 2015-12-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 6209 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14973606 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/973606
METHOD AND SYSTEM FOR SHARING CONTENT FILES USING A COMPUTER SYSTEM AND DATA NETWORK Dec 16, 2015 Abandoned
Array ( [id] => 13072983 [patent_doc_number] => 10057291 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-08-21 [patent_title] => Comparing networking access control lists [patent_app_type] => utility [patent_app_number] => 14/938650 [patent_app_country] => US [patent_app_date] => 2015-11-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8908 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 216 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14938650 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/938650
Comparing networking access control lists Nov 10, 2015 Issued
Array ( [id] => 11624154 [patent_doc_number] => 20170134343 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-05-11 [patent_title] => 'SMART STORAGE WITH VPN AND DISCOVERY' [patent_app_type] => utility [patent_app_number] => 14/938572 [patent_app_country] => US [patent_app_date] => 2015-11-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7361 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14938572 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/938572
Smart storage with VPN and discovery Nov 10, 2015 Issued
Array ( [id] => 10796227 [patent_doc_number] => 20160142383 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-05-19 [patent_title] => 'INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND PROGRAM' [patent_app_type] => utility [patent_app_number] => 14/938607 [patent_app_country] => US [patent_app_date] => 2015-11-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 15470 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14938607 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/938607
Information processing apparatus, control method, and program Nov 10, 2015 Issued
Array ( [id] => 10710981 [patent_doc_number] => 20160057128 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-25 [patent_title] => 'STRENGTH-BASED PASSWORD EXPIRATION' [patent_app_type] => utility [patent_app_number] => 14/930481 [patent_app_country] => US [patent_app_date] => 2015-11-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5010 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14930481 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/930481
Strength-based password expiration Nov 1, 2015 Issued
Array ( [id] => 11996529 [patent_doc_number] => 20170300684 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-10-19 [patent_title] => 'METHOD OF AUTHENTICATING A USER, CORRESPONDING TERMINALS AND AUTHENTICATION SYSTEM' [patent_app_type] => utility [patent_app_number] => 15/511961 [patent_app_country] => US [patent_app_date] => 2015-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4363 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15511961 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/511961
METHOD OF AUTHENTICATING A USER, CORRESPONDING TERMINALS AND AUTHENTICATION SYSTEM Sep 13, 2015 Abandoned
Array ( [id] => 11585059 [patent_doc_number] => 09639703 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-05-02 [patent_title] => 'Method, system, and computer program product for automatically mitigating vulnerabilities in source code' [patent_app_type] => utility [patent_app_number] => 14/845281 [patent_app_country] => US [patent_app_date] => 2015-09-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 6038 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 255 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14845281 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/845281
Method, system, and computer program product for automatically mitigating vulnerabilities in source code Sep 3, 2015 Issued
Array ( [id] => 16373570 [patent_doc_number] => 10805348 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-10-13 [patent_title] => Facilitating remote access of devices in a secure environment [patent_app_type] => utility [patent_app_number] => 14/842433 [patent_app_country] => US [patent_app_date] => 2015-09-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 11711 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 281 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14842433 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/842433
Facilitating remote access of devices in a secure environment Aug 31, 2015 Issued
Array ( [id] => 11912115 [patent_doc_number] => 09780946 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-10-03 [patent_title] => 'Elliptic curve encryption method comprising an error detection' [patent_app_type] => utility [patent_app_number] => 14/818684 [patent_app_country] => US [patent_app_date] => 2015-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 7 [patent_no_of_words] => 8236 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 123 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14818684 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/818684
Elliptic curve encryption method comprising an error detection Aug 4, 2015 Issued
Array ( [id] => 13669503 [patent_doc_number] => 10164944 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2018-12-25 [patent_title] => System, method, and computer program for implementing a virtual obfuscation service in a network [patent_app_type] => utility [patent_app_number] => 14/819263 [patent_app_country] => US [patent_app_date] => 2015-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 9016 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 755 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14819263 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/819263
System, method, and computer program for implementing a virtual obfuscation service in a network Aug 4, 2015 Issued
Array ( [id] => 10741645 [patent_doc_number] => 20160087796 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-24 [patent_title] => 'STRING PROCESSOR' [patent_app_type] => utility [patent_app_number] => 14/818464 [patent_app_country] => US [patent_app_date] => 2015-08-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 14236 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14818464 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/818464
String processor Aug 4, 2015 Issued
Menu