
Paul M. Rivard
Examiner (ID: 19168)
| Most Active Art Unit | 1304 |
| Art Unit(s) | 1304, 2899, 1734 |
| Total Applications | 355 |
| Issued Applications | 271 |
| Pending Applications | 27 |
| Abandoned Applications | 57 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 6513630
[patent_doc_number] => 20100011444
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-01-14
[patent_title] => 'Systems and Methods for Detecting A Security Breach in a Computer System'
[patent_app_type] => utility
[patent_app_number] => 12/511520
[patent_app_country] => US
[patent_app_date] => 2009-07-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4272
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0011/20100011444.pdf
[firstpage_image] =>[orig_patent_app_number] => 12511520
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/511520 | Systems and methods for detecting a security breach in a computer system | Jul 28, 2009 | Issued |
Array
(
[id] => 5370215
[patent_doc_number] => 20090307774
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-12-10
[patent_title] => 'COMPUTER PERIPHERAL APPARATUS AND METHOD OF CONTROLLING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 12/497762
[patent_app_country] => US
[patent_app_date] => 2009-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 7290
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0307/20090307774.pdf
[firstpage_image] =>[orig_patent_app_number] => 12497762
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/497762 | COMPUTER PERIPHERAL APPARATUS AND METHOD OF CONTROLLING THE SAME | Jul 5, 2009 | Abandoned |
Array
(
[id] => 8308960
[patent_doc_number] => 08230512
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-07-24
[patent_title] => 'Timestamp modification in a network security system'
[patent_app_type] => utility
[patent_app_number] => 12/493012
[patent_app_country] => US
[patent_app_date] => 2009-06-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3575
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 261
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12493012
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/493012 | Timestamp modification in a network security system | Jun 25, 2009 | Issued |
Array
(
[id] => 9834740
[patent_doc_number] => 08943575
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-01-27
[patent_title] => 'Method and system for policy simulation'
[patent_app_type] => utility
[patent_app_number] => 12/432186
[patent_app_country] => US
[patent_app_date] => 2009-04-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6815
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12432186
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/432186 | Method and system for policy simulation | Apr 28, 2009 | Issued |
Array
(
[id] => 5438225
[patent_doc_number] => 20090172812
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-07-02
[patent_title] => 'TWO FACTOR TOKEN IDENTIFICATION'
[patent_app_type] => utility
[patent_app_number] => 12/401195
[patent_app_country] => US
[patent_app_date] => 2009-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4634
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0172/20090172812.pdf
[firstpage_image] =>[orig_patent_app_number] => 12401195
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/401195 | TWO FACTOR TOKEN IDENTIFICATION | Mar 9, 2009 | Abandoned |
Array
(
[id] => 6228350
[patent_doc_number] => 20100183151
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-22
[patent_title] => 'USING AUTHENTICATION TOKENS TO AUTHORIZE A FIREWALL TO OPEN A PINHOLE'
[patent_app_type] => utility
[patent_app_number] => 12/355153
[patent_app_country] => US
[patent_app_date] => 2009-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5030
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0183/20100183151.pdf
[firstpage_image] =>[orig_patent_app_number] => 12355153
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/355153 | Using authentication tokens to authorize a firewall to open a pinhole | Jan 15, 2009 | Issued |
Array
(
[id] => 6234164
[patent_doc_number] => 20100185799
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-22
[patent_title] => 'System and Method for Security Configuration'
[patent_app_type] => utility
[patent_app_number] => 12/355398
[patent_app_country] => US
[patent_app_date] => 2009-01-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 1564
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12355398
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/355398 | System and method for security configuration | Jan 15, 2009 | Issued |
Array
(
[id] => 5356642
[patent_doc_number] => 20090187986
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-07-23
[patent_title] => 'AUTHENTICATION SERVER, AUTHENTICATION METHOD AND AUTHENTICATION PROGRAM'
[patent_app_type] => utility
[patent_app_number] => 12/354637
[patent_app_country] => US
[patent_app_date] => 2009-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 13069
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0187/20090187986.pdf
[firstpage_image] =>[orig_patent_app_number] => 12354637
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/354637 | Authentication server, authentication method and authentication program | Jan 14, 2009 | Issued |
Array
(
[id] => 6449220
[patent_doc_number] => 20100153741
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-17
[patent_title] => 'ENCRYPTING SYSTEM AND METHOD FOR NUMERICAL CONTROL DEVICES'
[patent_app_type] => utility
[patent_app_number] => 12/353933
[patent_app_country] => US
[patent_app_date] => 2009-01-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 1539
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0153/20100153741.pdf
[firstpage_image] =>[orig_patent_app_number] => 12353933
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/353933 | ENCRYPTING SYSTEM AND METHOD FOR NUMERICAL CONTROL DEVICES | Jan 13, 2009 | Abandoned |
Array
(
[id] => 5344600
[patent_doc_number] => 20090183250
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-07-16
[patent_title] => 'APPARATUS, SYSTEM, AND METHOD FOR TRANSFERRING AUTHORITY'
[patent_app_type] => utility
[patent_app_number] => 12/353150
[patent_app_country] => US
[patent_app_date] => 2009-01-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10727
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0183/20090183250.pdf
[firstpage_image] =>[orig_patent_app_number] => 12353150
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/353150 | APPARATUS, SYSTEM, AND METHOD FOR TRANSFERRING AUTHORITY | Jan 12, 2009 | Abandoned |
Array
(
[id] => 6446401
[patent_doc_number] => 20100169668
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-07-01
[patent_title] => 'Obtaining backups using a portable storage device'
[patent_app_type] => utility
[patent_app_number] => 12/319136
[patent_app_country] => US
[patent_app_date] => 2008-12-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7777
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0169/20100169668.pdf
[firstpage_image] =>[orig_patent_app_number] => 12319136
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/319136 | Obtaining backups using a portable storage device | Dec 30, 2008 | Issued |
Array
(
[id] => 5267066
[patent_doc_number] => 20090119751
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-05-07
[patent_title] => 'Communication device'
[patent_app_type] => utility
[patent_app_number] => 12/318418
[patent_app_country] => US
[patent_app_date] => 2008-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7549
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0119/20090119751.pdf
[firstpage_image] =>[orig_patent_app_number] => 12318418
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/318418 | Communication device | Dec 28, 2008 | Abandoned |
Array
(
[id] => 9314918
[patent_doc_number] => 08656153
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-18
[patent_title] => 'Authentication access method and authentication access system for wireless multi-hop network'
[patent_app_type] => utility
[patent_app_number] => 12/810374
[patent_app_country] => US
[patent_app_date] => 2008-12-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 9
[patent_no_of_words] => 11576
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 666
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12810374
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/810374 | Authentication access method and authentication access system for wireless multi-hop network | Dec 25, 2008 | Issued |
Array
(
[id] => 6415753
[patent_doc_number] => 20100150343
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-17
[patent_title] => 'SYSTEM AND METHOD FOR ENCRYPTING DATA BASED ON CYCLIC GROUPS'
[patent_app_type] => utility
[patent_app_number] => 12/334847
[patent_app_country] => US
[patent_app_date] => 2008-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 4778
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0150/20100150343.pdf
[firstpage_image] =>[orig_patent_app_number] => 12334847
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/334847 | SYSTEM AND METHOD FOR ENCRYPTING DATA BASED ON CYCLIC GROUPS | Dec 14, 2008 | Abandoned |
Array
(
[id] => 6452907
[patent_doc_number] => 20100154024
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-17
[patent_title] => 'METHODS, APPLIANCES, AND COMPUTER PROGRAM PRODUCTS FOR CONTROLLING ACCESS TO A COMMUNICATION NETWORK BASED ON POLICY INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 12/334002
[patent_app_country] => US
[patent_app_date] => 2008-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5443
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0154/20100154024.pdf
[firstpage_image] =>[orig_patent_app_number] => 12334002
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/334002 | METHODS, APPLIANCES, AND COMPUTER PROGRAM PRODUCTS FOR CONTROLLING ACCESS TO A COMMUNICATION NETWORK BASED ON POLICY INFORMATION | Dec 11, 2008 | Abandoned |
Array
(
[id] => 8319892
[patent_doc_number] => 08234693
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-07-31
[patent_title] => 'Secure document management'
[patent_app_type] => utility
[patent_app_number] => 12/334066
[patent_app_country] => US
[patent_app_date] => 2008-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 11788
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 351
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12334066
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/334066 | Secure document management | Dec 11, 2008 | Issued |
Array
(
[id] => 6241670
[patent_doc_number] => 20100269159
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-10-21
[patent_title] => 'METHOD AND DEVICE FOR OPERATING AN AUDIO AND/OR VIDEOCONFERENCE WITH AT LEAST TWO PARTICIPANTS'
[patent_app_type] => utility
[patent_app_number] => 12/810679
[patent_app_country] => US
[patent_app_date] => 2008-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3761
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0269/20100269159.pdf
[firstpage_image] =>[orig_patent_app_number] => 12810679
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/810679 | METHOD AND DEVICE FOR OPERATING AN AUDIO AND/OR VIDEOCONFERENCE WITH AT LEAST TWO PARTICIPANTS | Dec 7, 2008 | Abandoned |
Array
(
[id] => 10166661
[patent_doc_number] => 09197903
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-24
[patent_title] => 'Method and system for determining a macroblock partition for data transcoding'
[patent_app_type] => utility
[patent_app_number] => 12/253062
[patent_app_country] => US
[patent_app_date] => 2008-10-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2649
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12253062
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/253062 | Method and system for determining a macroblock partition for data transcoding | Oct 15, 2008 | Issued |
Array
(
[id] => 6057877
[patent_doc_number] => 20110113475
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-12
[patent_title] => 'NODE FOR A NETWORK AND METHOD FOR ESTABLISHING A DISTRIBUTED SECURITY ARCHITECTURE FOR A NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/674950
[patent_app_country] => US
[patent_app_date] => 2008-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6378
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0113/20110113475.pdf
[firstpage_image] =>[orig_patent_app_number] => 12674950
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/674950 | NODE FOR A NETWORK AND METHOD FOR ESTABLISHING A DISTRIBUTED SECURITY ARCHITECTURE FOR A NETWORK | Sep 3, 2008 | Abandoned |
Array
(
[id] => 6536262
[patent_doc_number] => 20100263019
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-10-14
[patent_title] => 'SECURE EXCHANGE OF MESSAGES'
[patent_app_type] => utility
[patent_app_number] => 12/675599
[patent_app_country] => US
[patent_app_date] => 2008-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2453
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0263/20100263019.pdf
[firstpage_image] =>[orig_patent_app_number] => 12675599
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/675599 | SECURE EXCHANGE OF MESSAGES | Aug 28, 2008 | Abandoned |