
Ian G. Paquette
Examiner (ID: 629, Phone: (571)270-5568 , Office: P/3753 )
| Most Active Art Unit | 3753 |
| Art Unit(s) | 3753 |
| Total Applications | 483 |
| Issued Applications | 364 |
| Pending Applications | 0 |
| Abandoned Applications | 119 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13753321
[patent_doc_number] => 10169608
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-01
[patent_title] => Dynamic management of data with context-based processing
[patent_app_type] => utility
[patent_app_number] => 15/154811
[patent_app_country] => US
[patent_app_date] => 2016-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 12914
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15154811
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/154811 | Dynamic management of data with context-based processing | May 12, 2016 | Issued |
Array
(
[id] => 14127481
[patent_doc_number] => 10250619
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-04-02
[patent_title] => Overlay cyber security networked system and method
[patent_app_type] => utility
[patent_app_number] => 15/154469
[patent_app_country] => US
[patent_app_date] => 2016-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 29246
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 356
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15154469
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/154469 | Overlay cyber security networked system and method | May 12, 2016 | Issued |
Array
(
[id] => 11340389
[patent_doc_number] => 20160366146
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-15
[patent_title] => 'SYSTEM ACCOUNT ACCESS MANAGER'
[patent_app_type] => utility
[patent_app_number] => 15/151497
[patent_app_country] => US
[patent_app_date] => 2016-05-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3125
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15151497
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/151497 | System account access manager | May 10, 2016 | Issued |
Array
(
[id] => 12055495
[patent_doc_number] => 20170331839
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-16
[patent_title] => 'CYBER-SECURITY PRESENCE MONITORING AND ASSESSMENT'
[patent_app_type] => utility
[patent_app_number] => 15/150955
[patent_app_country] => US
[patent_app_date] => 2016-05-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7180
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15150955
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/150955 | Cyber-security presence monitoring and assessment | May 9, 2016 | Issued |
Array
(
[id] => 13269243
[patent_doc_number] => 10146706
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-12-04
[patent_title] => Data security system
[patent_app_type] => utility
[patent_app_number] => 15/137897
[patent_app_country] => US
[patent_app_date] => 2016-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 22
[patent_no_of_words] => 10317
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15137897
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/137897 | Data security system | Apr 24, 2016 | Issued |
Array
(
[id] => 11035100
[patent_doc_number] => 20160232056
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-11
[patent_title] => 'REPRODUCING DATA FROM OBFUSCATED DATA RETRIEVED FROM A DISPERSED STORAGE NETWORK'
[patent_app_type] => utility
[patent_app_number] => 15/131488
[patent_app_country] => US
[patent_app_date] => 2016-04-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 20606
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15131488
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/131488 | Reproducing data from obfuscated data retrieved from a dispersed storage network | Apr 17, 2016 | Issued |
Array
(
[id] => 15367875
[patent_doc_number] => 20200019702
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-01-16
[patent_title] => A HYBRID APPROACH OF MALWARE DETECTION
[patent_app_type] => utility
[patent_app_number] => 16/088136
[patent_app_country] => US
[patent_app_date] => 2016-03-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8382
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16088136
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/088136 | A HYBRID APPROACH OF MALWARE DETECTION | Mar 24, 2016 | Abandoned |
Array
(
[id] => 10793899
[patent_doc_number] => 20160140056
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-19
[patent_title] => 'METHODS TO IMPROVE SECURE FLASH PROGRAMMING'
[patent_app_type] => utility
[patent_app_number] => 15/000785
[patent_app_country] => US
[patent_app_date] => 2016-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4441
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15000785
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/000785 | METHODS TO IMPROVE SECURE FLASH PROGRAMMING | Jan 18, 2016 | Abandoned |
Array
(
[id] => 13739699
[patent_doc_number] => 20180374319
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-12-27
[patent_title] => A DEVICE FOR DETECTION THE FOREIGN OBJECTS PLACED, JAMMING THE DATA WITH DISRUPTIVE SIGNALS, ISSUING WARNING NOTICES AND RECORDING THE EVENTS IN ORDER TO PROTECT THE DATA ON THE CARDS USED IN THE PAYMENT STATIONS
[patent_app_type] => utility
[patent_app_number] => 16/062222
[patent_app_country] => US
[patent_app_date] => 2015-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 2566
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 78
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16062222
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/062222 | A DEVICE FOR DETECTION THE FOREIGN OBJECTS PLACED, JAMMING THE DATA WITH DISRUPTIVE SIGNALS, ISSUING WARNING NOTICES AND RECORDING THE EVENTS IN ORDER TO PROTECT THE DATA ON THE CARDS USED IN THE PAYMENT STATIONS | Dec 30, 2015 | Abandoned |
Array
(
[id] => 10771364
[patent_doc_number] => 20160117520
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-28
[patent_title] => 'METHOD AND SYSTEM FOR SHARING CONTENT FILES USING A COMPUTER SYSTEM AND DATA NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/973606
[patent_app_country] => US
[patent_app_date] => 2015-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6209
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14973606
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/973606 | METHOD AND SYSTEM FOR SHARING CONTENT FILES USING A COMPUTER SYSTEM AND DATA NETWORK | Dec 16, 2015 | Abandoned |
Array
(
[id] => 13072983
[patent_doc_number] => 10057291
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-08-21
[patent_title] => Comparing networking access control lists
[patent_app_type] => utility
[patent_app_number] => 14/938650
[patent_app_country] => US
[patent_app_date] => 2015-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8908
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14938650
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/938650 | Comparing networking access control lists | Nov 10, 2015 | Issued |
Array
(
[id] => 11624154
[patent_doc_number] => 20170134343
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-11
[patent_title] => 'SMART STORAGE WITH VPN AND DISCOVERY'
[patent_app_type] => utility
[patent_app_number] => 14/938572
[patent_app_country] => US
[patent_app_date] => 2015-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7361
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14938572
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/938572 | Smart storage with VPN and discovery | Nov 10, 2015 | Issued |
Array
(
[id] => 10796227
[patent_doc_number] => 20160142383
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-19
[patent_title] => 'INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 14/938607
[patent_app_country] => US
[patent_app_date] => 2015-11-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 15470
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14938607
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/938607 | Information processing apparatus, control method, and program | Nov 10, 2015 | Issued |
Array
(
[id] => 10710981
[patent_doc_number] => 20160057128
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-25
[patent_title] => 'STRENGTH-BASED PASSWORD EXPIRATION'
[patent_app_type] => utility
[patent_app_number] => 14/930481
[patent_app_country] => US
[patent_app_date] => 2015-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5010
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14930481
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/930481 | Strength-based password expiration | Nov 1, 2015 | Issued |
Array
(
[id] => 11996529
[patent_doc_number] => 20170300684
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-19
[patent_title] => 'METHOD OF AUTHENTICATING A USER, CORRESPONDING TERMINALS AND AUTHENTICATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/511961
[patent_app_country] => US
[patent_app_date] => 2015-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4363
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15511961
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/511961 | METHOD OF AUTHENTICATING A USER, CORRESPONDING TERMINALS AND AUTHENTICATION SYSTEM | Sep 13, 2015 | Abandoned |
Array
(
[id] => 11585059
[patent_doc_number] => 09639703
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-02
[patent_title] => 'Method, system, and computer program product for automatically mitigating vulnerabilities in source code'
[patent_app_type] => utility
[patent_app_number] => 14/845281
[patent_app_country] => US
[patent_app_date] => 2015-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6038
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14845281
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/845281 | Method, system, and computer program product for automatically mitigating vulnerabilities in source code | Sep 3, 2015 | Issued |
Array
(
[id] => 16373570
[patent_doc_number] => 10805348
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-10-13
[patent_title] => Facilitating remote access of devices in a secure environment
[patent_app_type] => utility
[patent_app_number] => 14/842433
[patent_app_country] => US
[patent_app_date] => 2015-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 11711
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 281
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14842433
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/842433 | Facilitating remote access of devices in a secure environment | Aug 31, 2015 | Issued |
Array
(
[id] => 11912115
[patent_doc_number] => 09780946
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-03
[patent_title] => 'Elliptic curve encryption method comprising an error detection'
[patent_app_type] => utility
[patent_app_number] => 14/818684
[patent_app_country] => US
[patent_app_date] => 2015-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 7
[patent_no_of_words] => 8236
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 123
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14818684
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/818684 | Elliptic curve encryption method comprising an error detection | Aug 4, 2015 | Issued |
Array
(
[id] => 13669503
[patent_doc_number] => 10164944
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-12-25
[patent_title] => System, method, and computer program for implementing a virtual obfuscation service in a network
[patent_app_type] => utility
[patent_app_number] => 14/819263
[patent_app_country] => US
[patent_app_date] => 2015-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9016
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 755
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14819263
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/819263 | System, method, and computer program for implementing a virtual obfuscation service in a network | Aug 4, 2015 | Issued |
Array
(
[id] => 10741645
[patent_doc_number] => 20160087796
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-24
[patent_title] => 'STRING PROCESSOR'
[patent_app_type] => utility
[patent_app_number] => 14/818464
[patent_app_country] => US
[patent_app_date] => 2015-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 14236
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14818464
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/818464 | String processor | Aug 4, 2015 | Issued |