Search

Paul M. Rivard

Examiner (ID: 19168)

Most Active Art Unit
1304
Art Unit(s)
1304, 2899, 1734
Total Applications
355
Issued Applications
271
Pending Applications
27
Abandoned Applications
57

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 5576970 [patent_doc_number] => 20090144332 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-06-04 [patent_title] => 'SIDEBAND ACCESS BASED METHOD AND APPARATUS FOR DETERMINING SOFTWARE INTEGRITY' [patent_app_type] => utility [patent_app_number] => 11/947330 [patent_app_country] => US [patent_app_date] => 2007-11-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 2347 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0144/20090144332.pdf [firstpage_image] =>[orig_patent_app_number] => 11947330 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/947330
SIDEBAND ACCESS BASED METHOD AND APPARATUS FOR DETERMINING SOFTWARE INTEGRITY Nov 28, 2007 Abandoned
Array ( [id] => 4712910 [patent_doc_number] => 20080301436 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-12-04 [patent_title] => 'METHOD AND APPARATUS FOR PERFORMING AUTHENTICATION BETWEEN CLIENTS USING SESSION KEY SHARED WITH SERVER' [patent_app_type] => utility [patent_app_number] => 11/947211 [patent_app_country] => US [patent_app_date] => 2007-11-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4043 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0301/20080301436.pdf [firstpage_image] =>[orig_patent_app_number] => 11947211 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/947211
METHOD AND APPARATUS FOR PERFORMING AUTHENTICATION BETWEEN CLIENTS USING SESSION KEY SHARED WITH SERVER Nov 28, 2007 Abandoned
Array ( [id] => 5566121 [patent_doc_number] => 20090138974 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-05-28 [patent_title] => 'CONTROLLED ACCESS TO MEDIA CONTENT' [patent_app_type] => utility [patent_app_number] => 11/946820 [patent_app_country] => US [patent_app_date] => 2007-11-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3657 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0138/20090138974.pdf [firstpage_image] =>[orig_patent_app_number] => 11946820 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/946820
CONTROLLED ACCESS TO MEDIA CONTENT Nov 27, 2007 Abandoned
Array ( [id] => 10841566 [patent_doc_number] => 08869268 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-10-21 [patent_title] => 'Method and apparatus for disrupting the command and control infrastructure of hostile programs' [patent_app_type] => utility [patent_app_number] => 11/864699 [patent_app_country] => US [patent_app_date] => 2007-10-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3851 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 189 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11864699 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/864699
Method and apparatus for disrupting the command and control infrastructure of hostile programs Oct 23, 2007 Issued
Array ( [id] => 10847706 [patent_doc_number] => 08874907 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-10-28 [patent_title] => 'Controlling access to an NFS share' [patent_app_type] => utility [patent_app_number] => 11/864621 [patent_app_country] => US [patent_app_date] => 2007-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 3619 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 204 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11864621 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/864621
Controlling access to an NFS share Sep 27, 2007 Issued
Array ( [id] => 10512167 [patent_doc_number] => 09239745 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-01-19 [patent_title] => 'Method and apparatus for managing security vulnerability lifecycles' [patent_app_type] => utility [patent_app_number] => 11/864712 [patent_app_country] => US [patent_app_date] => 2007-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3492 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 285 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11864712 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/864712
Method and apparatus for managing security vulnerability lifecycles Sep 27, 2007 Issued
Array ( [id] => 9781696 [patent_doc_number] => 08856921 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-10-07 [patent_title] => 'Threat emergence date scan optimization to avoid unnecessary loading of scan engines' [patent_app_type] => utility [patent_app_number] => 11/864768 [patent_app_country] => US [patent_app_date] => 2007-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 4341 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 213 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11864768 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/864768
Threat emergence date scan optimization to avoid unnecessary loading of scan engines Sep 27, 2007 Issued
Array ( [id] => 9061723 [patent_doc_number] => 08548168 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-10-01 [patent_title] => 'Security module for securing an encrypted signal with system and method for use therewith' [patent_app_type] => utility [patent_app_number] => 11/864617 [patent_app_country] => US [patent_app_date] => 2007-09-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 5048 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 187 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11864617 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/864617
Security module for securing an encrypted signal with system and method for use therewith Sep 27, 2007 Issued
Array ( [id] => 4924007 [patent_doc_number] => 20080072324 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-03-20 [patent_title] => 'RESTRICTING A PROCESSING SYSTEM BEING COMPROMISED WITH A THREAT' [patent_app_type] => utility [patent_app_number] => 11/854741 [patent_app_country] => US [patent_app_date] => 2007-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 7504 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0072/20080072324.pdf [firstpage_image] =>[orig_patent_app_number] => 11854741 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/854741
Restricting a processing system being compromised with a threat Sep 12, 2007 Issued
Array ( [id] => 4921044 [patent_doc_number] => 20080069358 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-03-20 [patent_title] => 'PORTABLE STORAGE DEVICE WITH WIRELESS ENCRYPTION PROTECTION' [patent_app_type] => utility [patent_app_number] => 11/854718 [patent_app_country] => US [patent_app_date] => 2007-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2021 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0069/20080069358.pdf [firstpage_image] =>[orig_patent_app_number] => 11854718 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/854718
PORTABLE STORAGE DEVICE WITH WIRELESS ENCRYPTION PROTECTION Sep 12, 2007 Abandoned
Array ( [id] => 8308944 [patent_doc_number] => 08230496 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-07-24 [patent_title] => 'Method for improving security of the security token and apparatus therefor' [patent_app_type] => utility [patent_app_number] => 11/854668 [patent_app_country] => US [patent_app_date] => 2007-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 8 [patent_no_of_words] => 4254 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 222 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11854668 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/854668
Method for improving security of the security token and apparatus therefor Sep 12, 2007 Issued
Array ( [id] => 11904995 [patent_doc_number] => 09774445 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-09-26 [patent_title] => 'Host based rekeying' [patent_app_type] => utility [patent_app_number] => 11/772447 [patent_app_country] => US [patent_app_date] => 2007-09-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4107 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 216 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11772447 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/772447
Host based rekeying Sep 3, 2007 Issued
Array ( [id] => 4809151 [patent_doc_number] => 20080172729 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-07-17 [patent_title] => 'SYSTEM AND DEVICE FOR AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 11/840724 [patent_app_country] => US [patent_app_date] => 2007-08-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 35 [patent_figures_cnt] => 35 [patent_no_of_words] => 28140 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0172/20080172729.pdf [firstpage_image] =>[orig_patent_app_number] => 11840724 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/840724
System and device for authentication Aug 16, 2007 Issued
Array ( [id] => 9044157 [patent_doc_number] => 20130246795 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-09-19 [patent_title] => 'SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ALLOWING CONTENT TRANSFER BASED ON A SIGNATURE AND A CONTEXT THEREOF' [patent_app_type] => utility [patent_app_number] => 11/840737 [patent_app_country] => US [patent_app_date] => 2007-08-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 5275 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11840737 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/840737
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ALLOWING CONTENT TRANSFER BASED ON A SIGNATURE AND A CONTEXT THEREOF Aug 16, 2007 Abandoned
Array ( [id] => 5448287 [patent_doc_number] => 20090049513 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-02-19 [patent_title] => 'SYSTEM AND METHOD FOR CONTROLLING A VIRTUAL ENVIRONMENT OF A USER' [patent_app_type] => utility [patent_app_number] => 11/840647 [patent_app_country] => US [patent_app_date] => 2007-08-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 9954 [patent_no_of_claims] => 36 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0049/20090049513.pdf [firstpage_image] =>[orig_patent_app_number] => 11840647 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/840647
SYSTEM AND METHOD FOR CONTROLLING A VIRTUAL ENVIRONMENT OF A USER Aug 16, 2007 Abandoned
Array ( [id] => 8341988 [patent_doc_number] => 08243921 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-08-14 [patent_title] => 'Decryption system' [patent_app_type] => utility [patent_app_number] => 11/891209 [patent_app_country] => US [patent_app_date] => 2007-08-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 13 [patent_no_of_words] => 5543 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 175 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 11891209 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/891209
Decryption system Aug 8, 2007 Issued
Array ( [id] => 5298266 [patent_doc_number] => 20090013192 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-08 [patent_title] => 'INTEGRITY CHECK METHOD APPLIED TO ELECTRONIC DEVICE, AND RELATED CIRCUIT' [patent_app_type] => utility [patent_app_number] => 11/772829 [patent_app_country] => US [patent_app_date] => 2007-07-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 3106 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0013/20090013192.pdf [firstpage_image] =>[orig_patent_app_number] => 11772829 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/772829
INTEGRITY CHECK METHOD APPLIED TO ELECTRONIC DEVICE, AND RELATED CIRCUIT Jul 2, 2007 Abandoned
Array ( [id] => 7706282 [patent_doc_number] => 08090946 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-01-03 [patent_title] => 'Inter-system binding method and application based on hardware security unit' [patent_app_type] => utility [patent_app_number] => 11/772779 [patent_app_country] => US [patent_app_date] => 2007-07-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 3 [patent_no_of_words] => 3709 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 217 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/090/08090946.pdf [firstpage_image] =>[orig_patent_app_number] => 11772779 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/772779
Inter-system binding method and application based on hardware security unit Jul 1, 2007 Issued
Array ( [id] => 5298458 [patent_doc_number] => 20090013384 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-01-08 [patent_title] => 'Deriving a Username Based on a Digital Certificate' [patent_app_type] => utility [patent_app_number] => 11/772384 [patent_app_country] => US [patent_app_date] => 2007-07-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 3679 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0013/20090013384.pdf [firstpage_image] =>[orig_patent_app_number] => 11772384 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/772384
Deriving a username based on a digital certificate Jul 1, 2007 Issued
Array ( [id] => 4717901 [patent_doc_number] => 20080240423 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2008-10-02 [patent_title] => 'SPEEDING UP GALOIS COUNTER MODE (GCM) COMPUTATIONS' [patent_app_type] => utility [patent_app_number] => 11/772150 [patent_app_country] => US [patent_app_date] => 2007-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6512 [patent_no_of_claims] => 34 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0240/20080240423.pdf [firstpage_image] =>[orig_patent_app_number] => 11772150 [rel_patent_id] =>[rel_patent_doc_number] =>)
11/772150
Speeding up Galois Counter Mode (GCM) computations Jun 29, 2007 Issued
Menu