
Paul M. Rivard
Examiner (ID: 19168)
| Most Active Art Unit | 1304 |
| Art Unit(s) | 1304, 2899, 1734 |
| Total Applications | 355 |
| Issued Applications | 271 |
| Pending Applications | 27 |
| Abandoned Applications | 57 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 5576970
[patent_doc_number] => 20090144332
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-06-04
[patent_title] => 'SIDEBAND ACCESS BASED METHOD AND APPARATUS FOR DETERMINING SOFTWARE INTEGRITY'
[patent_app_type] => utility
[patent_app_number] => 11/947330
[patent_app_country] => US
[patent_app_date] => 2007-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2347
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0144/20090144332.pdf
[firstpage_image] =>[orig_patent_app_number] => 11947330
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/947330 | SIDEBAND ACCESS BASED METHOD AND APPARATUS FOR DETERMINING SOFTWARE INTEGRITY | Nov 28, 2007 | Abandoned |
Array
(
[id] => 4712910
[patent_doc_number] => 20080301436
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-12-04
[patent_title] => 'METHOD AND APPARATUS FOR PERFORMING AUTHENTICATION BETWEEN CLIENTS USING SESSION KEY SHARED WITH SERVER'
[patent_app_type] => utility
[patent_app_number] => 11/947211
[patent_app_country] => US
[patent_app_date] => 2007-11-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4043
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0301/20080301436.pdf
[firstpage_image] =>[orig_patent_app_number] => 11947211
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/947211 | METHOD AND APPARATUS FOR PERFORMING AUTHENTICATION BETWEEN CLIENTS USING SESSION KEY SHARED WITH SERVER | Nov 28, 2007 | Abandoned |
Array
(
[id] => 5566121
[patent_doc_number] => 20090138974
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-05-28
[patent_title] => 'CONTROLLED ACCESS TO MEDIA CONTENT'
[patent_app_type] => utility
[patent_app_number] => 11/946820
[patent_app_country] => US
[patent_app_date] => 2007-11-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3657
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0138/20090138974.pdf
[firstpage_image] =>[orig_patent_app_number] => 11946820
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/946820 | CONTROLLED ACCESS TO MEDIA CONTENT | Nov 27, 2007 | Abandoned |
Array
(
[id] => 10841566
[patent_doc_number] => 08869268
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-10-21
[patent_title] => 'Method and apparatus for disrupting the command and control infrastructure of hostile programs'
[patent_app_type] => utility
[patent_app_number] => 11/864699
[patent_app_country] => US
[patent_app_date] => 2007-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3851
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11864699
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/864699 | Method and apparatus for disrupting the command and control infrastructure of hostile programs | Oct 23, 2007 | Issued |
Array
(
[id] => 10847706
[patent_doc_number] => 08874907
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-10-28
[patent_title] => 'Controlling access to an NFS share'
[patent_app_type] => utility
[patent_app_number] => 11/864621
[patent_app_country] => US
[patent_app_date] => 2007-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3619
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 204
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11864621
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/864621 | Controlling access to an NFS share | Sep 27, 2007 | Issued |
Array
(
[id] => 10512167
[patent_doc_number] => 09239745
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-01-19
[patent_title] => 'Method and apparatus for managing security vulnerability lifecycles'
[patent_app_type] => utility
[patent_app_number] => 11/864712
[patent_app_country] => US
[patent_app_date] => 2007-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3492
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 285
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11864712
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/864712 | Method and apparatus for managing security vulnerability lifecycles | Sep 27, 2007 | Issued |
Array
(
[id] => 9781696
[patent_doc_number] => 08856921
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-10-07
[patent_title] => 'Threat emergence date scan optimization to avoid unnecessary loading of scan engines'
[patent_app_type] => utility
[patent_app_number] => 11/864768
[patent_app_country] => US
[patent_app_date] => 2007-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 4341
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11864768
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/864768 | Threat emergence date scan optimization to avoid unnecessary loading of scan engines | Sep 27, 2007 | Issued |
Array
(
[id] => 9061723
[patent_doc_number] => 08548168
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-10-01
[patent_title] => 'Security module for securing an encrypted signal with system and method for use therewith'
[patent_app_type] => utility
[patent_app_number] => 11/864617
[patent_app_country] => US
[patent_app_date] => 2007-09-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 5048
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11864617
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/864617 | Security module for securing an encrypted signal with system and method for use therewith | Sep 27, 2007 | Issued |
Array
(
[id] => 4924007
[patent_doc_number] => 20080072324
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-03-20
[patent_title] => 'RESTRICTING A PROCESSING SYSTEM BEING COMPROMISED WITH A THREAT'
[patent_app_type] => utility
[patent_app_number] => 11/854741
[patent_app_country] => US
[patent_app_date] => 2007-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7504
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0072/20080072324.pdf
[firstpage_image] =>[orig_patent_app_number] => 11854741
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/854741 | Restricting a processing system being compromised with a threat | Sep 12, 2007 | Issued |
Array
(
[id] => 4921044
[patent_doc_number] => 20080069358
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-03-20
[patent_title] => 'PORTABLE STORAGE DEVICE WITH WIRELESS ENCRYPTION PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 11/854718
[patent_app_country] => US
[patent_app_date] => 2007-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2021
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0069/20080069358.pdf
[firstpage_image] =>[orig_patent_app_number] => 11854718
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/854718 | PORTABLE STORAGE DEVICE WITH WIRELESS ENCRYPTION PROTECTION | Sep 12, 2007 | Abandoned |
Array
(
[id] => 8308944
[patent_doc_number] => 08230496
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-07-24
[patent_title] => 'Method for improving security of the security token and apparatus therefor'
[patent_app_type] => utility
[patent_app_number] => 11/854668
[patent_app_country] => US
[patent_app_date] => 2007-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 4254
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11854668
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/854668 | Method for improving security of the security token and apparatus therefor | Sep 12, 2007 | Issued |
Array
(
[id] => 11904995
[patent_doc_number] => 09774445
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-09-26
[patent_title] => 'Host based rekeying'
[patent_app_type] => utility
[patent_app_number] => 11/772447
[patent_app_country] => US
[patent_app_date] => 2007-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4107
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 216
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11772447
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/772447 | Host based rekeying | Sep 3, 2007 | Issued |
Array
(
[id] => 4809151
[patent_doc_number] => 20080172729
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-07-17
[patent_title] => 'SYSTEM AND DEVICE FOR AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 11/840724
[patent_app_country] => US
[patent_app_date] => 2007-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 35
[patent_figures_cnt] => 35
[patent_no_of_words] => 28140
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0172/20080172729.pdf
[firstpage_image] =>[orig_patent_app_number] => 11840724
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/840724 | System and device for authentication | Aug 16, 2007 | Issued |
Array
(
[id] => 9044157
[patent_doc_number] => 20130246795
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-19
[patent_title] => 'SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ALLOWING CONTENT TRANSFER BASED ON A SIGNATURE AND A CONTEXT THEREOF'
[patent_app_type] => utility
[patent_app_number] => 11/840737
[patent_app_country] => US
[patent_app_date] => 2007-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5275
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11840737
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/840737 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ALLOWING CONTENT TRANSFER BASED ON A SIGNATURE AND A CONTEXT THEREOF | Aug 16, 2007 | Abandoned |
Array
(
[id] => 5448287
[patent_doc_number] => 20090049513
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-02-19
[patent_title] => 'SYSTEM AND METHOD FOR CONTROLLING A VIRTUAL ENVIRONMENT OF A USER'
[patent_app_type] => utility
[patent_app_number] => 11/840647
[patent_app_country] => US
[patent_app_date] => 2007-08-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9954
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0049/20090049513.pdf
[firstpage_image] =>[orig_patent_app_number] => 11840647
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/840647 | SYSTEM AND METHOD FOR CONTROLLING A VIRTUAL ENVIRONMENT OF A USER | Aug 16, 2007 | Abandoned |
Array
(
[id] => 8341988
[patent_doc_number] => 08243921
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-08-14
[patent_title] => 'Decryption system'
[patent_app_type] => utility
[patent_app_number] => 11/891209
[patent_app_country] => US
[patent_app_date] => 2007-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 13
[patent_no_of_words] => 5543
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 175
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11891209
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/891209 | Decryption system | Aug 8, 2007 | Issued |
Array
(
[id] => 5298266
[patent_doc_number] => 20090013192
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-01-08
[patent_title] => 'INTEGRITY CHECK METHOD APPLIED TO ELECTRONIC DEVICE, AND RELATED CIRCUIT'
[patent_app_type] => utility
[patent_app_number] => 11/772829
[patent_app_country] => US
[patent_app_date] => 2007-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3106
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0013/20090013192.pdf
[firstpage_image] =>[orig_patent_app_number] => 11772829
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/772829 | INTEGRITY CHECK METHOD APPLIED TO ELECTRONIC DEVICE, AND RELATED CIRCUIT | Jul 2, 2007 | Abandoned |
Array
(
[id] => 7706282
[patent_doc_number] => 08090946
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-01-03
[patent_title] => 'Inter-system binding method and application based on hardware security unit'
[patent_app_type] => utility
[patent_app_number] => 11/772779
[patent_app_country] => US
[patent_app_date] => 2007-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 3709
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 217
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/090/08090946.pdf
[firstpage_image] =>[orig_patent_app_number] => 11772779
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/772779 | Inter-system binding method and application based on hardware security unit | Jul 1, 2007 | Issued |
Array
(
[id] => 5298458
[patent_doc_number] => 20090013384
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-01-08
[patent_title] => 'Deriving a Username Based on a Digital Certificate'
[patent_app_type] => utility
[patent_app_number] => 11/772384
[patent_app_country] => US
[patent_app_date] => 2007-07-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3679
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0013/20090013384.pdf
[firstpage_image] =>[orig_patent_app_number] => 11772384
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/772384 | Deriving a username based on a digital certificate | Jul 1, 2007 | Issued |
Array
(
[id] => 4717901
[patent_doc_number] => 20080240423
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-10-02
[patent_title] => 'SPEEDING UP GALOIS COUNTER MODE (GCM) COMPUTATIONS'
[patent_app_type] => utility
[patent_app_number] => 11/772150
[patent_app_country] => US
[patent_app_date] => 2007-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6512
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0240/20080240423.pdf
[firstpage_image] =>[orig_patent_app_number] => 11772150
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/772150 | Speeding up Galois Counter Mode (GCM) computations | Jun 29, 2007 | Issued |