Search

James A. Fiorito

Examiner (ID: 15267, Phone: (571)272-9921 , Office: P/1731 )

Most Active Art Unit
1731
Art Unit(s)
1736, 1754, 1793, 1731, 1734
Total Applications
965
Issued Applications
618
Pending Applications
91
Abandoned Applications
281

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 12576024 [patent_doc_number] => 10020946 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-07-10 [patent_title] => Multi-key encryption method [patent_app_type] => utility [patent_app_number] => 14/841288 [patent_app_country] => US [patent_app_date] => 2015-08-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4813 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 129 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841288 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/841288
Multi-key encryption method Aug 30, 2015 Issued
Array ( [id] => 10719424 [patent_doc_number] => 20160065571 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-03-03 [patent_title] => 'SYSTEM AND METHODS FOR SECURE FILE SHARING AND ACCESS MANAGEMENT' [patent_app_type] => utility [patent_app_number] => 14/836557 [patent_app_country] => US [patent_app_date] => 2015-08-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 18 [patent_figures_cnt] => 18 [patent_no_of_words] => 17895 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14836557 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/836557
SYSTEM AND METHODS FOR SECURE FILE SHARING AND ACCESS MANAGEMENT Aug 25, 2015 Abandoned
Array ( [id] => 10690702 [patent_doc_number] => 20160036849 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-04 [patent_title] => 'Method, Apparatus and System for Detecting and Disabling Computer Disruptive Technologies' [patent_app_type] => utility [patent_app_number] => 14/815906 [patent_app_country] => US [patent_app_date] => 2015-07-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 9776 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815906 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/815906
Method, Apparatus and System for Detecting and Disabling Computer Disruptive Technologies Jul 30, 2015 Abandoned
Array ( [id] => 15702103 [patent_doc_number] => 10607234 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-31 [patent_title] => Counterfeit prevention [patent_app_type] => utility [patent_app_number] => 15/522348 [patent_app_country] => US [patent_app_date] => 2015-07-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 7177 [patent_no_of_claims] => 22 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 93 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15522348 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/522348
Counterfeit prevention Jul 21, 2015 Issued
Array ( [id] => 10690693 [patent_doc_number] => 20160036839 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-02-04 [patent_title] => 'CONTROLLER FOR SOFTWARE DEFINED NETWORKING AND METHOD OF DETECTING ATTACKER' [patent_app_type] => utility [patent_app_number] => 14/797601 [patent_app_country] => US [patent_app_date] => 2015-07-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 15 [patent_no_of_words] => 10555 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14797601 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/797601
Controller for software defined networking and method of detecting attacker Jul 12, 2015 Issued
Array ( [id] => 14615473 [patent_doc_number] => 10360440 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-23 [patent_title] => Mobile terminal and control method thereof [patent_app_type] => utility [patent_app_number] => 15/519102 [patent_app_country] => US [patent_app_date] => 2015-07-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 21 [patent_no_of_words] => 13123 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15519102 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/519102
Mobile terminal and control method thereof Jul 9, 2015 Issued
Array ( [id] => 15582425 [patent_doc_number] => 10581618 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-03-03 [patent_title] => System, method and apparatus for providing enrollment of devices in a network [patent_app_type] => utility [patent_app_number] => 14/795081 [patent_app_country] => US [patent_app_date] => 2015-07-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 6 [patent_no_of_words] => 3678 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 153 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14795081 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/795081
System, method and apparatus for providing enrollment of devices in a network Jul 8, 2015 Issued
Array ( [id] => 13072891 [patent_doc_number] => 10057244 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-08-21 [patent_title] => Utilizing vehicle information as a security pin/passkey [patent_app_type] => utility [patent_app_number] => 14/795433 [patent_app_country] => US [patent_app_date] => 2015-07-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 3390 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 108 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14795433 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/795433
Utilizing vehicle information as a security pin/passkey Jul 8, 2015 Issued
Array ( [id] => 10994600 [patent_doc_number] => 20160191546 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-06-30 [patent_title] => 'APPLICATION MALWARE ISOLATION VIA HARDWARE SEPARATION' [patent_app_type] => utility [patent_app_number] => 14/794652 [patent_app_country] => US [patent_app_date] => 2015-07-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 5440 [patent_no_of_claims] => 4 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14794652 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/794652
APPLICATION MALWARE ISOLATION VIA HARDWARE SEPARATION Jul 7, 2015 Abandoned
Array ( [id] => 14556337 [patent_doc_number] => 10346630 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-09 [patent_title] => Method of managing several profiles in a secure element [patent_app_type] => utility [patent_app_number] => 15/503286 [patent_app_country] => US [patent_app_date] => 2015-07-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 3 [patent_no_of_words] => 2321 [patent_no_of_claims] => 9 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 134 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15503286 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/503286
Method of managing several profiles in a secure element Jul 2, 2015 Issued
Array ( [id] => 15017469 [patent_doc_number] => 10454909 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-10-22 [patent_title] => Key negotiation method and system, network entity and computer storage medium [patent_app_type] => utility [patent_app_number] => 15/537118 [patent_app_country] => US [patent_app_date] => 2015-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8806 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/537118
Key negotiation method and system, network entity and computer storage medium Jun 30, 2015 Issued
Array ( [id] => 15017469 [patent_doc_number] => 10454909 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-10-22 [patent_title] => Key negotiation method and system, network entity and computer storage medium [patent_app_type] => utility [patent_app_number] => 15/537118 [patent_app_country] => US [patent_app_date] => 2015-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8806 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/537118
Key negotiation method and system, network entity and computer storage medium Jun 30, 2015 Issued
Array ( [id] => 15017469 [patent_doc_number] => 10454909 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-10-22 [patent_title] => Key negotiation method and system, network entity and computer storage medium [patent_app_type] => utility [patent_app_number] => 15/537118 [patent_app_country] => US [patent_app_date] => 2015-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8806 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/537118
Key negotiation method and system, network entity and computer storage medium Jun 30, 2015 Issued
Array ( [id] => 15017469 [patent_doc_number] => 10454909 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-10-22 [patent_title] => Key negotiation method and system, network entity and computer storage medium [patent_app_type] => utility [patent_app_number] => 15/537118 [patent_app_country] => US [patent_app_date] => 2015-07-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 8806 [patent_no_of_claims] => 10 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 207 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/537118
Key negotiation method and system, network entity and computer storage medium Jun 30, 2015 Issued
Array ( [id] => 10379029 [patent_doc_number] => 20150264037 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-09-17 [patent_title] => 'TRUSTED VENDOR ACCESS' [patent_app_type] => utility [patent_app_number] => 14/713668 [patent_app_country] => US [patent_app_date] => 2015-05-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3476 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14713668 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/713668
Trusted vendor access May 14, 2015 Issued
Array ( [id] => 12174140 [patent_doc_number] => 09892285 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-02-13 [patent_title] => 'Accessory, electronic apparatus and system for accessory certification' [patent_app_type] => utility [patent_app_number] => 14/902307 [patent_app_country] => US [patent_app_date] => 2015-04-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 2 [patent_no_of_words] => 4325 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 110 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14902307 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/902307
Accessory, electronic apparatus and system for accessory certification Apr 12, 2015 Issued
Array ( [id] => 11445515 [patent_doc_number] => 20170046536 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-02-16 [patent_title] => 'Verification Paths of Leaves of a Tree' [patent_app_type] => utility [patent_app_number] => 14/443779 [patent_app_country] => US [patent_app_date] => 2015-04-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 7500 [patent_no_of_claims] => 28 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14443779 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/443779
Verification paths of leaves of a tree Apr 9, 2015 Issued
Array ( [id] => 11426058 [patent_doc_number] => 20170034204 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2017-02-02 [patent_title] => 'SECURITY PROTOCOL MONITORING' [patent_app_type] => utility [patent_app_number] => 15/303354 [patent_app_country] => US [patent_app_date] => 2015-04-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6912 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15303354 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/303354
Security protocol monitoring Apr 7, 2015 Issued
Array ( [id] => 14560493 [patent_doc_number] => 10348724 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-07-09 [patent_title] => Ad hoc one-time pairing of remote devices using online audio fingerprinting [patent_app_type] => utility [patent_app_number] => 15/302668 [patent_app_country] => US [patent_app_date] => 2015-04-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 19 [patent_figures_cnt] => 19 [patent_no_of_words] => 25302 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 119 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15302668 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/302668
Ad hoc one-time pairing of remote devices using online audio fingerprinting Apr 6, 2015 Issued
Array ( [id] => 10803736 [patent_doc_number] => 20160149892 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-05-26 [patent_title] => 'ELECTRONIC PASSWORD LOCK APPARATUS AND PASSWORD PROTECTION SYSTEM USING THE SAME' [patent_app_type] => utility [patent_app_number] => 14/678471 [patent_app_country] => US [patent_app_date] => 2015-04-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 1732 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14678471 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/678471
ELECTRONIC PASSWORD LOCK APPARATUS AND PASSWORD PROTECTION SYSTEM USING THE SAME Apr 2, 2015 Abandoned
Menu