
Ian G. Paquette
Examiner (ID: 629, Phone: (571)270-5568 , Office: P/3753 )
| Most Active Art Unit | 3753 |
| Art Unit(s) | 3753 |
| Total Applications | 483 |
| Issued Applications | 364 |
| Pending Applications | 0 |
| Abandoned Applications | 119 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 17019384
[patent_doc_number] => 11089040
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-10
[patent_title] => Cognitive analysis of security data with signal flow-based graph exploration
[patent_app_type] => utility
[patent_app_number] => 16/728471
[patent_app_country] => US
[patent_app_date] => 2019-12-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 11204
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16728471
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/728471 | Cognitive analysis of security data with signal flow-based graph exploration | Dec 26, 2019 | Issued |
Array
(
[id] => 18291508
[patent_doc_number] => 11620378
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-04-04
[patent_title] => Systems and methods for proactive and reactive data security
[patent_app_type] => utility
[patent_app_number] => 16/698328
[patent_app_country] => US
[patent_app_date] => 2019-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 13504
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 227
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16698328
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/698328 | Systems and methods for proactive and reactive data security | Nov 26, 2019 | Issued |
Array
(
[id] => 15936563
[patent_doc_number] => 20200159915
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-21
[patent_title] => Selective Import/Export Address Table Filtering
[patent_app_type] => utility
[patent_app_number] => 16/683816
[patent_app_country] => US
[patent_app_date] => 2019-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6422
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16683816
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/683816 | Selective import/export address table filtering | Nov 13, 2019 | Issued |
Array
(
[id] => 16826606
[patent_doc_number] => 20210141899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-13
[patent_title] => ENHANCING MEMORY SAFE PROGRAMMING USING A PAGE FRAME TAG MECHANISM
[patent_app_type] => utility
[patent_app_number] => 16/678904
[patent_app_country] => US
[patent_app_date] => 2019-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6836
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16678904
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/678904 | Enhancing memory safe programming using a page frame tag mechanism | Nov 7, 2019 | Issued |
Array
(
[id] => 16758805
[patent_doc_number] => 10977355
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-13
[patent_title] => Authentication method and device through face recognition
[patent_app_type] => utility
[patent_app_number] => 16/663232
[patent_app_country] => US
[patent_app_date] => 2019-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7988
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 280
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16663232
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/663232 | Authentication method and device through face recognition | Oct 23, 2019 | Issued |
Array
(
[id] => 15459723
[patent_doc_number] => 20200042686
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-06
[patent_title] => METHOD AND APPARATUS FOR USER AUTHENTICATION BASED ON FEATURE INFORMATION
[patent_app_type] => utility
[patent_app_number] => 16/599599
[patent_app_country] => US
[patent_app_date] => 2019-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11299
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16599599
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/599599 | Method and apparatus for user authentication based on feature information | Oct 10, 2019 | Issued |
Array
(
[id] => 17545114
[patent_doc_number] => 11310258
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-19
[patent_title] => Network portion risk assessment
[patent_app_type] => utility
[patent_app_number] => 16/583023
[patent_app_country] => US
[patent_app_date] => 2019-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 16103
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16583023
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/583023 | Network portion risk assessment | Sep 24, 2019 | Issued |
Array
(
[id] => 16944951
[patent_doc_number] => 11057210
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-07-06
[patent_title] => Distribution and recovery of a user secret
[patent_app_type] => utility
[patent_app_number] => 16/550836
[patent_app_country] => US
[patent_app_date] => 2019-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12772
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16550836
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/550836 | Distribution and recovery of a user secret | Aug 25, 2019 | Issued |
Array
(
[id] => 15623337
[patent_doc_number] => 20200082073
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-12
[patent_title] => SYSTEMS AND METHODS TO DETECT AND NEUTRALIZE MALWARE INFECTED ELECTRONIC COMMUNICATIONS
[patent_app_type] => utility
[patent_app_number] => 16/546944
[patent_app_country] => US
[patent_app_date] => 2019-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5744
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 79
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16546944
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/546944 | Systems and methods to detect and neutralize malware infected electronic communications | Aug 20, 2019 | Issued |
Array
(
[id] => 16630615
[patent_doc_number] => 20210049268
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-18
[patent_title] => System, Method, and Apparatus for Blocking False Alerts
[patent_app_type] => utility
[patent_app_number] => 16/541390
[patent_app_country] => US
[patent_app_date] => 2019-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3778
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 54
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16541390
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/541390 | System, Method, and Apparatus for Blocking False Alerts | Aug 14, 2019 | Abandoned |
Array
(
[id] => 15261589
[patent_doc_number] => 20190379528
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-12
[patent_title] => METHODS, SYSTEMS, AND MEDIA FOR USING DYNAMIC PUBLIC KEY INFRASTRUCTURE TO SEND AND RECEIVE ENCRYPTED MESSAGES
[patent_app_type] => utility
[patent_app_number] => 16/530445
[patent_app_country] => US
[patent_app_date] => 2019-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6867
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16530445
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/530445 | Methods, systems, and media for using dynamic public key infrastructure to send and receive encrypted messages | Aug 1, 2019 | Issued |
Array
(
[id] => 15156411
[patent_doc_number] => 20190356683
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-21
[patent_title] => CYBER-SECURITY PRESENCE MONITORING AND ASSESSMENT
[patent_app_type] => utility
[patent_app_number] => 16/526124
[patent_app_country] => US
[patent_app_date] => 2019-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6975
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 72
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16526124
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/526124 | Cyber-security presence monitoring and assessment | Jul 29, 2019 | Issued |
Array
(
[id] => 15095019
[patent_doc_number] => 20190342321
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-07
[patent_title] => LEARNING INTERNAL RANGES FROM NETWORK TRAFFIC DATA TO AUGMENT ANOMALY DETECTION SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 16/517748
[patent_app_country] => US
[patent_app_date] => 2019-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10518
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16517748
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/517748 | Learning internal ranges from network traffic data to augment anomaly detection systems | Jul 21, 2019 | Issued |
Array
(
[id] => 19872748
[patent_doc_number] => 12265609
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-04-01
[patent_title] => Training device, detection system, training method, and training program
[patent_app_type] => utility
[patent_app_number] => 17/624579
[patent_app_country] => US
[patent_app_date] => 2019-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 7933
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17624579
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/624579 | Training device, detection system, training method, and training program | Jul 17, 2019 | Issued |
Array
(
[id] => 16594708
[patent_doc_number] => 10903992
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-01-26
[patent_title] => Systems and methods for encrypting communication over a fiber optic line
[patent_app_type] => utility
[patent_app_number] => 16/509999
[patent_app_country] => US
[patent_app_date] => 2019-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7045
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 334
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16509999
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/509999 | Systems and methods for encrypting communication over a fiber optic line | Jul 11, 2019 | Issued |
Array
(
[id] => 19276158
[patent_doc_number] => 12026286
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-07-02
[patent_title] => Executing containers during idle states
[patent_app_type] => utility
[patent_app_number] => 17/419067
[patent_app_country] => US
[patent_app_date] => 2019-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4341
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 59
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17419067
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/419067 | Executing containers during idle states | Jul 9, 2019 | Issued |
Array
(
[id] => 15600501
[patent_doc_number] => 20200076785
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-05
[patent_title] => SPLIT AUTHENTICATION NETWORK SYSTEMS AND METHODS
[patent_app_type] => utility
[patent_app_number] => 16/506945
[patent_app_country] => US
[patent_app_date] => 2019-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10699
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 148
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16506945
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/506945 | Split authentication network systems and methods | Jul 8, 2019 | Issued |
Array
(
[id] => 18130429
[patent_doc_number] => 11556640
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-01-17
[patent_title] => Systems and methods for automated cybersecurity analysis of extracted binary string sets
[patent_app_type] => utility
[patent_app_number] => 16/455624
[patent_app_country] => US
[patent_app_date] => 2019-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 8
[patent_no_of_words] => 8707
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 143
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16455624
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/455624 | Systems and methods for automated cybersecurity analysis of extracted binary string sets | Jun 26, 2019 | Issued |
Array
(
[id] => 15152373
[patent_doc_number] => 20190354664
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-21
[patent_title] => SYSTEMS AND METHODS FOR AUTHENTICATING A USER BASED ON A COMPUTING DEVICE
[patent_app_type] => utility
[patent_app_number] => 16/431279
[patent_app_country] => US
[patent_app_date] => 2019-06-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13395
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16431279
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/431279 | Systems and methods for authenticating a user based on a computing device | Jun 3, 2019 | Issued |
Array
(
[id] => 16675983
[patent_doc_number] => 20210064749
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-03-04
[patent_title] => ATTACK DETECTION THROUGH EXPOSURE OF COMMAND ABUSE
[patent_app_type] => utility
[patent_app_number] => 16/426122
[patent_app_country] => US
[patent_app_date] => 2019-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 15813
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 111
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16426122
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/426122 | Attack detection through exposure of command abuse | May 29, 2019 | Issued |