
James A. Fiorito
Examiner (ID: 15267, Phone: (571)272-9921 , Office: P/1731 )
| Most Active Art Unit | 1731 |
| Art Unit(s) | 1736, 1754, 1793, 1731, 1734 |
| Total Applications | 965 |
| Issued Applications | 618 |
| Pending Applications | 91 |
| Abandoned Applications | 281 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9548640
[patent_doc_number] => 20140173288
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-06-19
[patent_title] => 'ELLIPTIC CURVE CRYPTOGRAPHY WITH FRAGMENTED KEY PROCESSING AND METHODS FOR USE THEREWITH'
[patent_app_type] => utility
[patent_app_number] => 14/138583
[patent_app_country] => US
[patent_app_date] => 2013-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6577
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14138583
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/138583 | Elliptic curve cryptography with fragmented key processing and methods for use therewith | Dec 22, 2013 | Issued |
Array
(
[id] => 9781721
[patent_doc_number] => 08856947
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-10-07
[patent_title] => 'Intrusion detection and prevention processing within network interface circuitry'
[patent_app_type] => utility
[patent_app_number] => 14/099577
[patent_app_country] => US
[patent_app_date] => 2013-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5286
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 156
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14099577
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/099577 | Intrusion detection and prevention processing within network interface circuitry | Dec 5, 2013 | Issued |
Array
(
[id] => 10603343
[patent_doc_number] => 09323911
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-04-26
[patent_title] => 'Verifying requests to remove applications from a device'
[patent_app_type] => utility
[patent_app_number] => 14/080306
[patent_app_country] => US
[patent_app_date] => 2013-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6146
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14080306
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/080306 | Verifying requests to remove applications from a device | Nov 13, 2013 | Issued |
Array
(
[id] => 13144327
[patent_doc_number] => 10089498
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-10-02
[patent_title] => Memory integrity checking
[patent_app_type] => utility
[patent_app_number] => 15/021022
[patent_app_country] => US
[patent_app_date] => 2013-10-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5151
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15021022
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/021022 | Memory integrity checking | Oct 30, 2013 | Issued |
Array
(
[id] => 10456328
[patent_doc_number] => 20150341343
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-26
[patent_title] => 'RFID Tag and Method for Operating an RFID Tag'
[patent_app_type] => utility
[patent_app_number] => 14/758950
[patent_app_country] => US
[patent_app_date] => 2013-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4237
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14758950
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/758950 | RFID tag and method for operating an RFID tag | Oct 22, 2013 | Issued |
Array
(
[id] => 11029901
[patent_doc_number] => 20160226857
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-08-04
[patent_title] => 'Methods and Apparatus of Key Pairing for D2D Devices under Different D2D Areas'
[patent_app_type] => utility
[patent_app_number] => 15/022024
[patent_app_country] => US
[patent_app_date] => 2013-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7695
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15022024
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/022024 | Methods and apparatus of key pairing for D2D devices under different D2D areas | Sep 26, 2013 | Issued |
Array
(
[id] => 9934238
[patent_doc_number] => 20150082430
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-19
[patent_title] => 'Data Flow Based Behavioral Analysis on Mobile Devices'
[patent_app_type] => utility
[patent_app_number] => 14/030053
[patent_app_country] => US
[patent_app_date] => 2013-09-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13620
[patent_no_of_claims] => 32
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14030053
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/030053 | Data flow based behavioral analysis on mobile devices | Sep 17, 2013 | Issued |
Array
(
[id] => 11899186
[patent_doc_number] => 09769135
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-09-19
[patent_title] => 'Information processing device, information processing client, access authentication method, and program'
[patent_app_type] => utility
[patent_app_number] => 14/028985
[patent_app_country] => US
[patent_app_date] => 2013-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 20
[patent_no_of_words] => 18568
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 153
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14028985
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/028985 | Information processing device, information processing client, access authentication method, and program | Sep 16, 2013 | Issued |
Array
(
[id] => 9933847
[patent_doc_number] => 20150082039
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-19
[patent_title] => 'NETWORK CONNECTION AUTOMATION'
[patent_app_type] => utility
[patent_app_number] => 14/029496
[patent_app_country] => US
[patent_app_date] => 2013-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 14996
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14029496
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/029496 | Network connection automation | Sep 16, 2013 | Issued |
Array
(
[id] => 9437754
[patent_doc_number] => 20140115661
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-24
[patent_title] => 'USER AUTHENTICATION METHOD AND SYSTEM FOR USING WEB MULTI CONTENTS'
[patent_app_type] => utility
[patent_app_number] => 14/028011
[patent_app_country] => US
[patent_app_date] => 2013-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3501
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14028011
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/028011 | USER AUTHENTICATION METHOD AND SYSTEM FOR USING WEB MULTI CONTENTS | Sep 15, 2013 | Abandoned |
Array
(
[id] => 10178115
[patent_doc_number] => 09208322
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-08
[patent_title] => 'Privacy leak detection in .NET framework'
[patent_app_type] => utility
[patent_app_number] => 14/028474
[patent_app_country] => US
[patent_app_date] => 2013-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 4657
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14028474
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/028474 | Privacy leak detection in .NET framework | Sep 15, 2013 | Issued |
Array
(
[id] => 9934263
[patent_doc_number] => 20150082454
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-19
[patent_title] => 'SYSTEMS AND METHODS FOR LICENSING OF MOBILE APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 14/027143
[patent_app_country] => US
[patent_app_date] => 2013-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8560
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027143
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/027143 | Systems and methods for licensing of mobile applications | Sep 12, 2013 | Issued |
Array
(
[id] => 10196597
[patent_doc_number] => 09225515
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-29
[patent_title] => 'Shared portal context session'
[patent_app_type] => utility
[patent_app_number] => 14/026748
[patent_app_country] => US
[patent_app_date] => 2013-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 7594
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 304
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14026748
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/026748 | Shared portal context session | Sep 12, 2013 | Issued |
Array
(
[id] => 11688248
[patent_doc_number] => 09686304
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-06-20
[patent_title] => 'Systems and methods for healing infected document files'
[patent_app_type] => utility
[patent_app_number] => 14/025779
[patent_app_country] => US
[patent_app_date] => 2013-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 11303
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14025779
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/025779 | Systems and methods for healing infected document files | Sep 11, 2013 | Issued |
Array
(
[id] => 10550592
[patent_doc_number] => 09275218
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-03-01
[patent_title] => 'Methods and apparatus for verification of a user at a first device based on input received from a second device'
[patent_app_type] => utility
[patent_app_number] => 14/025333
[patent_app_country] => US
[patent_app_date] => 2013-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5404
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14025333
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/025333 | Methods and apparatus for verification of a user at a first device based on input received from a second device | Sep 11, 2013 | Issued |
Array
(
[id] => 12394086
[patent_doc_number] => 09965611
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-08
[patent_title] => Comparing real-time movements to pattern profile background
[patent_app_type] => utility
[patent_app_number] => 14/909547
[patent_app_country] => US
[patent_app_date] => 2013-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 4189
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 130
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14909547
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/909547 | Comparing real-time movements to pattern profile background | Aug 29, 2013 | Issued |
Array
(
[id] => 13809615
[patent_doc_number] => 10182079
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-15
[patent_title] => Lawful interception and security based admission control for proximity service
[patent_app_type] => utility
[patent_app_number] => 14/897928
[patent_app_country] => US
[patent_app_date] => 2013-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12722
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14897928
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/897928 | Lawful interception and security based admission control for proximity service | Aug 27, 2013 | Issued |
Array
(
[id] => 13809615
[patent_doc_number] => 10182079
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-15
[patent_title] => Lawful interception and security based admission control for proximity service
[patent_app_type] => utility
[patent_app_number] => 14/897928
[patent_app_country] => US
[patent_app_date] => 2013-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12722
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14897928
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/897928 | Lawful interception and security based admission control for proximity service | Aug 27, 2013 | Issued |
Array
(
[id] => 13809615
[patent_doc_number] => 10182079
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-15
[patent_title] => Lawful interception and security based admission control for proximity service
[patent_app_type] => utility
[patent_app_number] => 14/897928
[patent_app_country] => US
[patent_app_date] => 2013-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12722
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14897928
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/897928 | Lawful interception and security based admission control for proximity service | Aug 27, 2013 | Issued |
Array
(
[id] => 13809615
[patent_doc_number] => 10182079
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-15
[patent_title] => Lawful interception and security based admission control for proximity service
[patent_app_type] => utility
[patent_app_number] => 14/897928
[patent_app_country] => US
[patent_app_date] => 2013-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 12722
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 122
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14897928
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/897928 | Lawful interception and security based admission control for proximity service | Aug 27, 2013 | Issued |