Search

James A. Fiorito

Examiner (ID: 15267, Phone: (571)272-9921 , Office: P/1731 )

Most Active Art Unit
1731
Art Unit(s)
1736, 1754, 1793, 1731, 1734
Total Applications
965
Issued Applications
618
Pending Applications
91
Abandoned Applications
281

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9548640 [patent_doc_number] => 20140173288 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-06-19 [patent_title] => 'ELLIPTIC CURVE CRYPTOGRAPHY WITH FRAGMENTED KEY PROCESSING AND METHODS FOR USE THEREWITH' [patent_app_type] => utility [patent_app_number] => 14/138583 [patent_app_country] => US [patent_app_date] => 2013-12-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6577 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14138583 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/138583
Elliptic curve cryptography with fragmented key processing and methods for use therewith Dec 22, 2013 Issued
Array ( [id] => 9781721 [patent_doc_number] => 08856947 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-10-07 [patent_title] => 'Intrusion detection and prevention processing within network interface circuitry' [patent_app_type] => utility [patent_app_number] => 14/099577 [patent_app_country] => US [patent_app_date] => 2013-12-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5286 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 156 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14099577 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/099577
Intrusion detection and prevention processing within network interface circuitry Dec 5, 2013 Issued
Array ( [id] => 10603343 [patent_doc_number] => 09323911 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-04-26 [patent_title] => 'Verifying requests to remove applications from a device' [patent_app_type] => utility [patent_app_number] => 14/080306 [patent_app_country] => US [patent_app_date] => 2013-11-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 6146 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 127 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14080306 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/080306
Verifying requests to remove applications from a device Nov 13, 2013 Issued
Array ( [id] => 13144327 [patent_doc_number] => 10089498 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-10-02 [patent_title] => Memory integrity checking [patent_app_type] => utility [patent_app_number] => 15/021022 [patent_app_country] => US [patent_app_date] => 2013-10-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5151 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 110 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15021022 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/021022
Memory integrity checking Oct 30, 2013 Issued
Array ( [id] => 10456328 [patent_doc_number] => 20150341343 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-11-26 [patent_title] => 'RFID Tag and Method for Operating an RFID Tag' [patent_app_type] => utility [patent_app_number] => 14/758950 [patent_app_country] => US [patent_app_date] => 2013-10-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4237 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14758950 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/758950
RFID tag and method for operating an RFID tag Oct 22, 2013 Issued
Array ( [id] => 11029901 [patent_doc_number] => 20160226857 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2016-08-04 [patent_title] => 'Methods and Apparatus of Key Pairing for D2D Devices under Different D2D Areas' [patent_app_type] => utility [patent_app_number] => 15/022024 [patent_app_country] => US [patent_app_date] => 2013-09-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 7695 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15022024 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/022024
Methods and apparatus of key pairing for D2D devices under different D2D areas Sep 26, 2013 Issued
Array ( [id] => 9934238 [patent_doc_number] => 20150082430 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-19 [patent_title] => 'Data Flow Based Behavioral Analysis on Mobile Devices' [patent_app_type] => utility [patent_app_number] => 14/030053 [patent_app_country] => US [patent_app_date] => 2013-09-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 13 [patent_figures_cnt] => 13 [patent_no_of_words] => 13620 [patent_no_of_claims] => 32 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14030053 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/030053
Data flow based behavioral analysis on mobile devices Sep 17, 2013 Issued
Array ( [id] => 11899186 [patent_doc_number] => 09769135 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2017-09-19 [patent_title] => 'Information processing device, information processing client, access authentication method, and program' [patent_app_type] => utility [patent_app_number] => 14/028985 [patent_app_country] => US [patent_app_date] => 2013-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 15 [patent_figures_cnt] => 20 [patent_no_of_words] => 18568 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 153 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14028985 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/028985
Information processing device, information processing client, access authentication method, and program Sep 16, 2013 Issued
Array ( [id] => 9933847 [patent_doc_number] => 20150082039 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-19 [patent_title] => 'NETWORK CONNECTION AUTOMATION' [patent_app_type] => utility [patent_app_number] => 14/029496 [patent_app_country] => US [patent_app_date] => 2013-09-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 14996 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14029496 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/029496
Network connection automation Sep 16, 2013 Issued
Array ( [id] => 9437754 [patent_doc_number] => 20140115661 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-04-24 [patent_title] => 'USER AUTHENTICATION METHOD AND SYSTEM FOR USING WEB MULTI CONTENTS' [patent_app_type] => utility [patent_app_number] => 14/028011 [patent_app_country] => US [patent_app_date] => 2013-09-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3501 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14028011 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/028011
USER AUTHENTICATION METHOD AND SYSTEM FOR USING WEB MULTI CONTENTS Sep 15, 2013 Abandoned
Array ( [id] => 10178115 [patent_doc_number] => 09208322 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2015-12-08 [patent_title] => 'Privacy leak detection in .NET framework' [patent_app_type] => utility [patent_app_number] => 14/028474 [patent_app_country] => US [patent_app_date] => 2013-09-16 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 10 [patent_no_of_words] => 4657 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 218 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14028474 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/028474
Privacy leak detection in .NET framework Sep 15, 2013 Issued
Array ( [id] => 9934263 [patent_doc_number] => 20150082454 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-03-19 [patent_title] => 'SYSTEMS AND METHODS FOR LICENSING OF MOBILE APPLICATIONS' [patent_app_type] => utility [patent_app_number] => 14/027143 [patent_app_country] => US [patent_app_date] => 2013-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 10 [patent_no_of_words] => 8560 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027143 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/027143
Systems and methods for licensing of mobile applications Sep 12, 2013 Issued
Array ( [id] => 10196597 [patent_doc_number] => 09225515 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-12-29 [patent_title] => 'Shared portal context session' [patent_app_type] => utility [patent_app_number] => 14/026748 [patent_app_country] => US [patent_app_date] => 2013-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 7 [patent_no_of_words] => 7594 [patent_no_of_claims] => 16 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 304 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14026748 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/026748
Shared portal context session Sep 12, 2013 Issued
Array ( [id] => 11688248 [patent_doc_number] => 09686304 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2017-06-20 [patent_title] => 'Systems and methods for healing infected document files' [patent_app_type] => utility [patent_app_number] => 14/025779 [patent_app_country] => US [patent_app_date] => 2013-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 11303 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 225 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14025779 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/025779
Systems and methods for healing infected document files Sep 11, 2013 Issued
Array ( [id] => 10550592 [patent_doc_number] => 09275218 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-03-01 [patent_title] => 'Methods and apparatus for verification of a user at a first device based on input received from a second device' [patent_app_type] => utility [patent_app_number] => 14/025333 [patent_app_country] => US [patent_app_date] => 2013-09-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5404 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 162 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14025333 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/025333
Methods and apparatus for verification of a user at a first device based on input received from a second device Sep 11, 2013 Issued
Array ( [id] => 12394086 [patent_doc_number] => 09965611 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2018-05-08 [patent_title] => Comparing real-time movements to pattern profile background [patent_app_type] => utility [patent_app_number] => 14/909547 [patent_app_country] => US [patent_app_date] => 2013-08-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 4189 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 130 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14909547 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/909547
Comparing real-time movements to pattern profile background Aug 29, 2013 Issued
Array ( [id] => 13809615 [patent_doc_number] => 10182079 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-01-15 [patent_title] => Lawful interception and security based admission control for proximity service [patent_app_type] => utility [patent_app_number] => 14/897928 [patent_app_country] => US [patent_app_date] => 2013-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 12722 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14897928 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/897928
Lawful interception and security based admission control for proximity service Aug 27, 2013 Issued
Array ( [id] => 13809615 [patent_doc_number] => 10182079 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-01-15 [patent_title] => Lawful interception and security based admission control for proximity service [patent_app_type] => utility [patent_app_number] => 14/897928 [patent_app_country] => US [patent_app_date] => 2013-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 12722 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14897928 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/897928
Lawful interception and security based admission control for proximity service Aug 27, 2013 Issued
Array ( [id] => 13809615 [patent_doc_number] => 10182079 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-01-15 [patent_title] => Lawful interception and security based admission control for proximity service [patent_app_type] => utility [patent_app_number] => 14/897928 [patent_app_country] => US [patent_app_date] => 2013-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 12722 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14897928 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/897928
Lawful interception and security based admission control for proximity service Aug 27, 2013 Issued
Array ( [id] => 13809615 [patent_doc_number] => 10182079 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-01-15 [patent_title] => Lawful interception and security based admission control for proximity service [patent_app_type] => utility [patent_app_number] => 14/897928 [patent_app_country] => US [patent_app_date] => 2013-08-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 12722 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 122 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14897928 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/897928
Lawful interception and security based admission control for proximity service Aug 27, 2013 Issued
Menu