
James A. Fiorito
Examiner (ID: 15267, Phone: (571)272-9921 , Office: P/1731 )
| Most Active Art Unit | 1731 |
| Art Unit(s) | 1736, 1754, 1793, 1731, 1734 |
| Total Applications | 965 |
| Issued Applications | 618 |
| Pending Applications | 91 |
| Abandoned Applications | 281 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 12576024
[patent_doc_number] => 10020946
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-10
[patent_title] => Multi-key encryption method
[patent_app_type] => utility
[patent_app_number] => 14/841288
[patent_app_country] => US
[patent_app_date] => 2015-08-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4813
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 129
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14841288
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/841288 | Multi-key encryption method | Aug 30, 2015 | Issued |
Array
(
[id] => 10719424
[patent_doc_number] => 20160065571
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'SYSTEM AND METHODS FOR SECURE FILE SHARING AND ACCESS MANAGEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/836557
[patent_app_country] => US
[patent_app_date] => 2015-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 17895
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14836557
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/836557 | SYSTEM AND METHODS FOR SECURE FILE SHARING AND ACCESS MANAGEMENT | Aug 25, 2015 | Abandoned |
Array
(
[id] => 10690702
[patent_doc_number] => 20160036849
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'Method, Apparatus and System for Detecting and Disabling Computer Disruptive Technologies'
[patent_app_type] => utility
[patent_app_number] => 14/815906
[patent_app_country] => US
[patent_app_date] => 2015-07-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9776
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14815906
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/815906 | Method, Apparatus and System for Detecting and Disabling Computer Disruptive Technologies | Jul 30, 2015 | Abandoned |
Array
(
[id] => 15702103
[patent_doc_number] => 10607234
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-31
[patent_title] => Counterfeit prevention
[patent_app_type] => utility
[patent_app_number] => 15/522348
[patent_app_country] => US
[patent_app_date] => 2015-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7177
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15522348
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/522348 | Counterfeit prevention | Jul 21, 2015 | Issued |
Array
(
[id] => 10690693
[patent_doc_number] => 20160036839
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-02-04
[patent_title] => 'CONTROLLER FOR SOFTWARE DEFINED NETWORKING AND METHOD OF DETECTING ATTACKER'
[patent_app_type] => utility
[patent_app_number] => 14/797601
[patent_app_country] => US
[patent_app_date] => 2015-07-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 10555
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14797601
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/797601 | Controller for software defined networking and method of detecting attacker | Jul 12, 2015 | Issued |
Array
(
[id] => 14615473
[patent_doc_number] => 10360440
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-23
[patent_title] => Mobile terminal and control method thereof
[patent_app_type] => utility
[patent_app_number] => 15/519102
[patent_app_country] => US
[patent_app_date] => 2015-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 21
[patent_no_of_words] => 13123
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15519102
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/519102 | Mobile terminal and control method thereof | Jul 9, 2015 | Issued |
Array
(
[id] => 15582425
[patent_doc_number] => 10581618
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-03
[patent_title] => System, method and apparatus for providing enrollment of devices in a network
[patent_app_type] => utility
[patent_app_number] => 14/795081
[patent_app_country] => US
[patent_app_date] => 2015-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 3678
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14795081
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/795081 | System, method and apparatus for providing enrollment of devices in a network | Jul 8, 2015 | Issued |
Array
(
[id] => 13072891
[patent_doc_number] => 10057244
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-08-21
[patent_title] => Utilizing vehicle information as a security pin/passkey
[patent_app_type] => utility
[patent_app_number] => 14/795433
[patent_app_country] => US
[patent_app_date] => 2015-07-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3390
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14795433
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/795433 | Utilizing vehicle information as a security pin/passkey | Jul 8, 2015 | Issued |
Array
(
[id] => 10994600
[patent_doc_number] => 20160191546
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-06-30
[patent_title] => 'APPLICATION MALWARE ISOLATION VIA HARDWARE SEPARATION'
[patent_app_type] => utility
[patent_app_number] => 14/794652
[patent_app_country] => US
[patent_app_date] => 2015-07-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5440
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14794652
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/794652 | APPLICATION MALWARE ISOLATION VIA HARDWARE SEPARATION | Jul 7, 2015 | Abandoned |
Array
(
[id] => 14556337
[patent_doc_number] => 10346630
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-09
[patent_title] => Method of managing several profiles in a secure element
[patent_app_type] => utility
[patent_app_number] => 15/503286
[patent_app_country] => US
[patent_app_date] => 2015-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 2321
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15503286
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/503286 | Method of managing several profiles in a secure element | Jul 2, 2015 | Issued |
Array
(
[id] => 15017469
[patent_doc_number] => 10454909
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Key negotiation method and system, network entity and computer storage medium
[patent_app_type] => utility
[patent_app_number] => 15/537118
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8806
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/537118 | Key negotiation method and system, network entity and computer storage medium | Jun 30, 2015 | Issued |
Array
(
[id] => 15017469
[patent_doc_number] => 10454909
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Key negotiation method and system, network entity and computer storage medium
[patent_app_type] => utility
[patent_app_number] => 15/537118
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8806
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/537118 | Key negotiation method and system, network entity and computer storage medium | Jun 30, 2015 | Issued |
Array
(
[id] => 15017469
[patent_doc_number] => 10454909
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Key negotiation method and system, network entity and computer storage medium
[patent_app_type] => utility
[patent_app_number] => 15/537118
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8806
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/537118 | Key negotiation method and system, network entity and computer storage medium | Jun 30, 2015 | Issued |
Array
(
[id] => 15017469
[patent_doc_number] => 10454909
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Key negotiation method and system, network entity and computer storage medium
[patent_app_type] => utility
[patent_app_number] => 15/537118
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8806
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 207
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15537118
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/537118 | Key negotiation method and system, network entity and computer storage medium | Jun 30, 2015 | Issued |
Array
(
[id] => 10379029
[patent_doc_number] => 20150264037
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-09-17
[patent_title] => 'TRUSTED VENDOR ACCESS'
[patent_app_type] => utility
[patent_app_number] => 14/713668
[patent_app_country] => US
[patent_app_date] => 2015-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3476
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14713668
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/713668 | Trusted vendor access | May 14, 2015 | Issued |
Array
(
[id] => 12174140
[patent_doc_number] => 09892285
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-02-13
[patent_title] => 'Accessory, electronic apparatus and system for accessory certification'
[patent_app_type] => utility
[patent_app_number] => 14/902307
[patent_app_country] => US
[patent_app_date] => 2015-04-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 2
[patent_no_of_words] => 4325
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14902307
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/902307 | Accessory, electronic apparatus and system for accessory certification | Apr 12, 2015 | Issued |
Array
(
[id] => 11445515
[patent_doc_number] => 20170046536
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-16
[patent_title] => 'Verification Paths of Leaves of a Tree'
[patent_app_type] => utility
[patent_app_number] => 14/443779
[patent_app_country] => US
[patent_app_date] => 2015-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7500
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14443779
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/443779 | Verification paths of leaves of a tree | Apr 9, 2015 | Issued |
Array
(
[id] => 11426058
[patent_doc_number] => 20170034204
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-02
[patent_title] => 'SECURITY PROTOCOL MONITORING'
[patent_app_type] => utility
[patent_app_number] => 15/303354
[patent_app_country] => US
[patent_app_date] => 2015-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6912
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15303354
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/303354 | Security protocol monitoring | Apr 7, 2015 | Issued |
Array
(
[id] => 14560493
[patent_doc_number] => 10348724
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-07-09
[patent_title] => Ad hoc one-time pairing of remote devices using online audio fingerprinting
[patent_app_type] => utility
[patent_app_number] => 15/302668
[patent_app_country] => US
[patent_app_date] => 2015-04-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 25302
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 119
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15302668
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/302668 | Ad hoc one-time pairing of remote devices using online audio fingerprinting | Apr 6, 2015 | Issued |
Array
(
[id] => 10803736
[patent_doc_number] => 20160149892
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-26
[patent_title] => 'ELECTRONIC PASSWORD LOCK APPARATUS AND PASSWORD PROTECTION SYSTEM USING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 14/678471
[patent_app_country] => US
[patent_app_date] => 2015-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 1732
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14678471
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/678471 | ELECTRONIC PASSWORD LOCK APPARATUS AND PASSWORD PROTECTION SYSTEM USING THE SAME | Apr 2, 2015 | Abandoned |