Search

Ian G. Paquette

Examiner (ID: 629, Phone: (571)270-5568 , Office: P/3753 )

Most Active Art Unit
3753
Art Unit(s)
3753
Total Applications
483
Issued Applications
364
Pending Applications
0
Abandoned Applications
119

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9548641 [patent_doc_number] => 20140173289 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-06-19 [patent_title] => 'MOBILE IDENTITY PROVIDER WITH TWO FACTOR AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 14/187575 [patent_app_country] => US [patent_app_date] => 2014-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 10962 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14187575 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/187575
MOBILE IDENTITY PROVIDER WITH TWO FACTOR AUTHENTICATION Feb 23, 2014 Abandoned
Array ( [id] => 9479687 [patent_doc_number] => 20140137150 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-05-15 [patent_title] => 'ON-DEMAND SWITCHED CONTENT ENCRYPTION' [patent_app_type] => utility [patent_app_number] => 14/157983 [patent_app_country] => US [patent_app_date] => 2014-01-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 16132 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14157983 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/157983
On-demand switched content encryption Jan 16, 2014 Issued
Array ( [id] => 10941555 [patent_doc_number] => 20140344576 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-11-20 [patent_title] => 'KEY VALIDATION SCHEME' [patent_app_type] => utility [patent_app_number] => 14/089358 [patent_app_country] => US [patent_app_date] => 2013-11-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3438 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14089358 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/089358
KEY VALIDATION SCHEME Nov 24, 2013 Abandoned
Array ( [id] => 9992965 [patent_doc_number] => 09038186 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-05-19 [patent_title] => 'Malware detection using file names' [patent_app_type] => utility [patent_app_number] => 14/089560 [patent_app_country] => US [patent_app_date] => 2013-11-25 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5698 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 158 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14089560 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/089560
Malware detection using file names Nov 24, 2013 Issued
Array ( [id] => 10201021 [patent_doc_number] => 20150086007 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-26 [patent_title] => 'COMPACT, LOW POWER ADVANCED ENCRYPTION STANDARD CIRCUIT' [patent_app_type] => utility [patent_app_number] => 14/035508 [patent_app_country] => US [patent_app_date] => 2013-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 6229 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14035508 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/035508
Compact, low power advanced encryption standard circuit Sep 23, 2013 Issued
Array ( [id] => 9410529 [patent_doc_number] => 20140101781 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-04-10 [patent_title] => 'PEER-TO-PEER, REAL-TIME, DIGITAL MEDIA DISTRIBUTION' [patent_app_type] => utility [patent_app_number] => 14/035273 [patent_app_country] => US [patent_app_date] => 2013-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4257 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14035273 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/035273
PEER-TO-PEER, REAL-TIME, DIGITAL MEDIA DISTRIBUTION Sep 23, 2013 Abandoned
Array ( [id] => 10204577 [patent_doc_number] => 20150089566 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-26 [patent_title] => 'ESCALATION SECURITY METHOD FOR USE IN SOFTWARE DEFINED NETWORKS' [patent_app_type] => utility [patent_app_number] => 14/035367 [patent_app_country] => US [patent_app_date] => 2013-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 7169 [patent_no_of_claims] => 27 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14035367 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/035367
ESCALATION SECURITY METHOD FOR USE IN SOFTWARE DEFINED NETWORKS Sep 23, 2013 Abandoned
Array ( [id] => 11848563 [patent_doc_number] => 09736131 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-08-15 [patent_title] => 'Secure login for subscriber devices' [patent_app_type] => utility [patent_app_number] => 14/035301 [patent_app_country] => US [patent_app_date] => 2013-09-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7652 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 180 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14035301 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/035301
Secure login for subscriber devices Sep 23, 2013 Issued
Array ( [id] => 9437813 [patent_doc_number] => 20140115719 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-04-24 [patent_title] => 'INFORMATION PROCESSING APPARATUS AND CONTROL METHOD' [patent_app_type] => utility [patent_app_number] => 14/027644 [patent_app_country] => US [patent_app_date] => 2013-09-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 24 [patent_figures_cnt] => 24 [patent_no_of_words] => 18852 [patent_no_of_claims] => 11 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027644 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/027644
INFORMATION PROCESSING APPARATUS AND CONTROL METHOD Sep 15, 2013 Abandoned
Array ( [id] => 12337860 [patent_doc_number] => 09948626 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-04-17 [patent_title] => Split authentication network systems and methods [patent_app_type] => utility [patent_app_number] => 14/027188 [patent_app_country] => US [patent_app_date] => 2013-09-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 10667 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 302 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027188 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/027188
Split authentication network systems and methods Sep 13, 2013 Issued
Array ( [id] => 9372824 [patent_doc_number] => 20140082697 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-03-20 [patent_title] => 'SYSTEM ENHANCEMENTS FOR ENABLING NON-3GPP OFFLOAD IN 3GPP' [patent_app_type] => utility [patent_app_number] => 14/026546 [patent_app_country] => US [patent_app_date] => 2013-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 16051 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14026546 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/026546
System enhancements for enabling non-3GPP offload in 3GPP Sep 12, 2013 Issued
Array ( [id] => 9934251 [patent_doc_number] => 20150082443 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-19 [patent_title] => 'SYSTEM TO AUTOMATE COMPLIANCE WITH LICENSES OF SOFTWARE THIRD-PARTY CONTENT' [patent_app_type] => utility [patent_app_number] => 14/026823 [patent_app_country] => US [patent_app_date] => 2013-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3140 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14026823 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/026823
SYSTEM TO AUTOMATE COMPLIANCE WITH LICENSES OF SOFTWARE THIRD-PARTY CONTENT Sep 12, 2013 Abandoned
Array ( [id] => 9320947 [patent_doc_number] => 20140053285 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-02-20 [patent_title] => 'METHODS FOR DETECTING PLAGIARISM IN SOFTWARE CODE AND DEVICES THEREOF' [patent_app_type] => utility [patent_app_number] => 13/963135 [patent_app_country] => US [patent_app_date] => 2013-08-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3256 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963135 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/963135
METHODS FOR DETECTING PLAGIARISM IN SOFTWARE CODE AND DEVICES THEREOF Aug 8, 2013 Abandoned
Array ( [id] => 9867014 [patent_doc_number] => 20150047033 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-12 [patent_title] => 'DETECTING CO-OCCURRENCE PATTERNS IN DNS' [patent_app_type] => utility [patent_app_number] => 13/963390 [patent_app_country] => US [patent_app_date] => 2013-08-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3600 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963390 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/963390
Detecting co-occurrence patterns in DNS Aug 8, 2013 Issued
Array ( [id] => 10611975 [patent_doc_number] => 09332031 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-05-03 [patent_title] => 'Categorizing accounts based on associated images' [patent_app_type] => utility [patent_app_number] => 13/963428 [patent_app_country] => US [patent_app_date] => 2013-08-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6111 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 156 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963428 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/963428
Categorizing accounts based on associated images Aug 8, 2013 Issued
Array ( [id] => 10189092 [patent_doc_number] => 09218512 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-22 [patent_title] => 'Portable computer and operating method thereof' [patent_app_type] => utility [patent_app_number] => 13/963458 [patent_app_country] => US [patent_app_date] => 2013-08-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2559 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 190 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963458 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/963458
Portable computer and operating method thereof Aug 8, 2013 Issued
Array ( [id] => 10530415 [patent_doc_number] => 09256551 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-02-09 [patent_title] => 'Embedded encryption/secure memory management unit for peripheral interface controller' [patent_app_type] => utility [patent_app_number] => 13/963457 [patent_app_country] => US [patent_app_date] => 2013-08-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5662 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 120 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963457 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/963457
Embedded encryption/secure memory management unit for peripheral interface controller Aug 8, 2013 Issued
Array ( [id] => 9308561 [patent_doc_number] => 20140047235 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-02-13 [patent_title] => 'LOCAL TRUSTED SERVICE MANAGER' [patent_app_type] => utility [patent_app_number] => 13/962858 [patent_app_country] => US [patent_app_date] => 2013-08-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3613 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13962858 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/962858
Local trusted service manager Aug 7, 2013 Issued
Array ( [id] => 9863710 [patent_doc_number] => 20150043729 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-02-12 [patent_title] => 'INSTRUCTION AND LOGIC TO PROVIDE A SECURE CIPHER HASH ROUND FUNCTIONALITY' [patent_app_type] => utility [patent_app_number] => 13/962933 [patent_app_country] => US [patent_app_date] => 2013-08-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 25 [patent_figures_cnt] => 25 [patent_no_of_words] => 19541 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13962933 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/962933
Instruction and logic to provide a secure cipher hash round functionality Aug 7, 2013 Issued
Array ( [id] => 10139252 [patent_doc_number] => 09172580 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-10-27 [patent_title] => 'Selecting transceiver for wireless network based on security keys' [patent_app_type] => utility [patent_app_number] => 13/962439 [patent_app_country] => US [patent_app_date] => 2013-08-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7168 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 191 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13962439 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/962439
Selecting transceiver for wireless network based on security keys Aug 7, 2013 Issued
Menu