
Ian G. Paquette
Examiner (ID: 629, Phone: (571)270-5568 , Office: P/3753 )
| Most Active Art Unit | 3753 |
| Art Unit(s) | 3753 |
| Total Applications | 483 |
| Issued Applications | 364 |
| Pending Applications | 0 |
| Abandoned Applications | 119 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9548641
[patent_doc_number] => 20140173289
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-19
[patent_title] => 'MOBILE IDENTITY PROVIDER WITH TWO FACTOR AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 14/187575
[patent_app_country] => US
[patent_app_date] => 2014-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 10962
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14187575
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/187575 | MOBILE IDENTITY PROVIDER WITH TWO FACTOR AUTHENTICATION | Feb 23, 2014 | Abandoned |
Array
(
[id] => 9479687
[patent_doc_number] => 20140137150
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-15
[patent_title] => 'ON-DEMAND SWITCHED CONTENT ENCRYPTION'
[patent_app_type] => utility
[patent_app_number] => 14/157983
[patent_app_country] => US
[patent_app_date] => 2014-01-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 16132
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14157983
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/157983 | On-demand switched content encryption | Jan 16, 2014 | Issued |
Array
(
[id] => 10941555
[patent_doc_number] => 20140344576
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-20
[patent_title] => 'KEY VALIDATION SCHEME'
[patent_app_type] => utility
[patent_app_number] => 14/089358
[patent_app_country] => US
[patent_app_date] => 2013-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3438
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14089358
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/089358 | KEY VALIDATION SCHEME | Nov 24, 2013 | Abandoned |
Array
(
[id] => 9992965
[patent_doc_number] => 09038186
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-05-19
[patent_title] => 'Malware detection using file names'
[patent_app_type] => utility
[patent_app_number] => 14/089560
[patent_app_country] => US
[patent_app_date] => 2013-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5698
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14089560
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/089560 | Malware detection using file names | Nov 24, 2013 | Issued |
Array
(
[id] => 10201021
[patent_doc_number] => 20150086007
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'COMPACT, LOW POWER ADVANCED ENCRYPTION STANDARD CIRCUIT'
[patent_app_type] => utility
[patent_app_number] => 14/035508
[patent_app_country] => US
[patent_app_date] => 2013-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 6229
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14035508
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/035508 | Compact, low power advanced encryption standard circuit | Sep 23, 2013 | Issued |
Array
(
[id] => 9410529
[patent_doc_number] => 20140101781
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-10
[patent_title] => 'PEER-TO-PEER, REAL-TIME, DIGITAL MEDIA DISTRIBUTION'
[patent_app_type] => utility
[patent_app_number] => 14/035273
[patent_app_country] => US
[patent_app_date] => 2013-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4257
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14035273
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/035273 | PEER-TO-PEER, REAL-TIME, DIGITAL MEDIA DISTRIBUTION | Sep 23, 2013 | Abandoned |
Array
(
[id] => 10204577
[patent_doc_number] => 20150089566
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-26
[patent_title] => 'ESCALATION SECURITY METHOD FOR USE IN SOFTWARE DEFINED NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 14/035367
[patent_app_country] => US
[patent_app_date] => 2013-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 7169
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14035367
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/035367 | ESCALATION SECURITY METHOD FOR USE IN SOFTWARE DEFINED NETWORKS | Sep 23, 2013 | Abandoned |
Array
(
[id] => 11848563
[patent_doc_number] => 09736131
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-15
[patent_title] => 'Secure login for subscriber devices'
[patent_app_type] => utility
[patent_app_number] => 14/035301
[patent_app_country] => US
[patent_app_date] => 2013-09-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7652
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 180
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14035301
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/035301 | Secure login for subscriber devices | Sep 23, 2013 | Issued |
Array
(
[id] => 9437813
[patent_doc_number] => 20140115719
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-24
[patent_title] => 'INFORMATION PROCESSING APPARATUS AND CONTROL METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/027644
[patent_app_country] => US
[patent_app_date] => 2013-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 18852
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027644
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/027644 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD | Sep 15, 2013 | Abandoned |
Array
(
[id] => 12337860
[patent_doc_number] => 09948626
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-17
[patent_title] => Split authentication network systems and methods
[patent_app_type] => utility
[patent_app_number] => 14/027188
[patent_app_country] => US
[patent_app_date] => 2013-09-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10667
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 302
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027188
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/027188 | Split authentication network systems and methods | Sep 13, 2013 | Issued |
Array
(
[id] => 9372824
[patent_doc_number] => 20140082697
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-20
[patent_title] => 'SYSTEM ENHANCEMENTS FOR ENABLING NON-3GPP OFFLOAD IN 3GPP'
[patent_app_type] => utility
[patent_app_number] => 14/026546
[patent_app_country] => US
[patent_app_date] => 2013-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16051
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14026546
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/026546 | System enhancements for enabling non-3GPP offload in 3GPP | Sep 12, 2013 | Issued |
Array
(
[id] => 9934251
[patent_doc_number] => 20150082443
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-19
[patent_title] => 'SYSTEM TO AUTOMATE COMPLIANCE WITH LICENSES OF SOFTWARE THIRD-PARTY CONTENT'
[patent_app_type] => utility
[patent_app_number] => 14/026823
[patent_app_country] => US
[patent_app_date] => 2013-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3140
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14026823
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/026823 | SYSTEM TO AUTOMATE COMPLIANCE WITH LICENSES OF SOFTWARE THIRD-PARTY CONTENT | Sep 12, 2013 | Abandoned |
Array
(
[id] => 9320947
[patent_doc_number] => 20140053285
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-20
[patent_title] => 'METHODS FOR DETECTING PLAGIARISM IN SOFTWARE CODE AND DEVICES THEREOF'
[patent_app_type] => utility
[patent_app_number] => 13/963135
[patent_app_country] => US
[patent_app_date] => 2013-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3256
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963135
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/963135 | METHODS FOR DETECTING PLAGIARISM IN SOFTWARE CODE AND DEVICES THEREOF | Aug 8, 2013 | Abandoned |
Array
(
[id] => 9867014
[patent_doc_number] => 20150047033
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-12
[patent_title] => 'DETECTING CO-OCCURRENCE PATTERNS IN DNS'
[patent_app_type] => utility
[patent_app_number] => 13/963390
[patent_app_country] => US
[patent_app_date] => 2013-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3600
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963390
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/963390 | Detecting co-occurrence patterns in DNS | Aug 8, 2013 | Issued |
Array
(
[id] => 10611975
[patent_doc_number] => 09332031
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-05-03
[patent_title] => 'Categorizing accounts based on associated images'
[patent_app_type] => utility
[patent_app_number] => 13/963428
[patent_app_country] => US
[patent_app_date] => 2013-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6111
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963428
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/963428 | Categorizing accounts based on associated images | Aug 8, 2013 | Issued |
Array
(
[id] => 10189092
[patent_doc_number] => 09218512
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-22
[patent_title] => 'Portable computer and operating method thereof'
[patent_app_type] => utility
[patent_app_number] => 13/963458
[patent_app_country] => US
[patent_app_date] => 2013-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2559
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963458
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/963458 | Portable computer and operating method thereof | Aug 8, 2013 | Issued |
Array
(
[id] => 10530415
[patent_doc_number] => 09256551
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-09
[patent_title] => 'Embedded encryption/secure memory management unit for peripheral interface controller'
[patent_app_type] => utility
[patent_app_number] => 13/963457
[patent_app_country] => US
[patent_app_date] => 2013-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5662
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13963457
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/963457 | Embedded encryption/secure memory management unit for peripheral interface controller | Aug 8, 2013 | Issued |
Array
(
[id] => 9308561
[patent_doc_number] => 20140047235
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-13
[patent_title] => 'LOCAL TRUSTED SERVICE MANAGER'
[patent_app_type] => utility
[patent_app_number] => 13/962858
[patent_app_country] => US
[patent_app_date] => 2013-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3613
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13962858
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/962858 | Local trusted service manager | Aug 7, 2013 | Issued |
Array
(
[id] => 9863710
[patent_doc_number] => 20150043729
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-02-12
[patent_title] => 'INSTRUCTION AND LOGIC TO PROVIDE A SECURE CIPHER HASH ROUND FUNCTIONALITY'
[patent_app_type] => utility
[patent_app_number] => 13/962933
[patent_app_country] => US
[patent_app_date] => 2013-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 19541
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13962933
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/962933 | Instruction and logic to provide a secure cipher hash round functionality | Aug 7, 2013 | Issued |
Array
(
[id] => 10139252
[patent_doc_number] => 09172580
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-10-27
[patent_title] => 'Selecting transceiver for wireless network based on security keys'
[patent_app_type] => utility
[patent_app_number] => 13/962439
[patent_app_country] => US
[patent_app_date] => 2013-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7168
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 191
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13962439
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/962439 | Selecting transceiver for wireless network based on security keys | Aug 7, 2013 | Issued |