Search

Michael J. Carone

Supervisory Patent Examiner (ID: 3588, Phone: (303)297-4220 , Office: P/3600 )

Most Active Art Unit
2201
Art Unit(s)
3641, 2201, 3616, 3643, 3600
Total Applications
774
Issued Applications
729
Pending Applications
6
Abandoned Applications
39

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 7820152 [patent_doc_number] => 20120066772 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-03-15 [patent_title] => 'Scalable Anti-Replay Windowing' [patent_app_type] => utility [patent_app_number] => 13/300801 [patent_app_country] => US [patent_app_date] => 2011-11-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 3356 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0066/20120066772.pdf [firstpage_image] =>[orig_patent_app_number] => 13300801 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/300801
Scalable anti-replay windowing Nov 20, 2011 Issued
Array ( [id] => 9302393 [patent_doc_number] => 08650638 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-02-11 [patent_title] => 'System and method for detecting a file embedded in an arbitrary location and determining the reputation of the file' [patent_app_type] => utility [patent_app_number] => 13/276197 [patent_app_country] => US [patent_app_date] => 2011-10-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5453 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 162 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13276197 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/276197
System and method for detecting a file embedded in an arbitrary location and determining the reputation of the file Oct 17, 2011 Issued
Array ( [id] => 9242552 [patent_doc_number] => 08607358 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-12-10 [patent_title] => 'Storing encrypted objects' [patent_app_type] => utility [patent_app_number] => 13/110323 [patent_app_country] => US [patent_app_date] => 2011-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 13271 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 238 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13110323 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/110323
Storing encrypted objects May 17, 2011 Issued
Array ( [id] => 9302412 [patent_doc_number] => 08650657 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2014-02-11 [patent_title] => 'Storing encrypted objects' [patent_app_type] => utility [patent_app_number] => 13/110336 [patent_app_country] => US [patent_app_date] => 2011-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 13029 [patent_no_of_claims] => 33 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 253 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13110336 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/110336
Storing encrypted objects May 17, 2011 Issued
Array ( [id] => 9236284 [patent_doc_number] => 08601600 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-12-03 [patent_title] => 'Storing encrypted objects' [patent_app_type] => utility [patent_app_number] => 13/110306 [patent_app_country] => US [patent_app_date] => 2011-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 13171 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 213 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13110306 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/110306
Storing encrypted objects May 17, 2011 Issued
Array ( [id] => 6189319 [patent_doc_number] => 20110126012 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-26 [patent_title] => 'METHOD AND SYSTEM FOR SECURE DATA COLLECTION AND DISTRIBUTION' [patent_app_type] => utility [patent_app_number] => 12/956065 [patent_app_country] => US [patent_app_date] => 2010-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 69 [patent_figures_cnt] => 69 [patent_no_of_words] => 6467 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0126/20110126012.pdf [firstpage_image] =>[orig_patent_app_number] => 12956065 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/956065
Method and system for secure data collection and distribution Nov 29, 2010 Issued
Array ( [id] => 5942964 [patent_doc_number] => 20110103584 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-05 [patent_title] => 'PROTECTION OF A CIPHERING KEY' [patent_app_type] => utility [patent_app_number] => 12/917792 [patent_app_country] => US [patent_app_date] => 2010-11-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3904 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0103/20110103584.pdf [firstpage_image] =>[orig_patent_app_number] => 12917792 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/917792
Protection of a ciphering key Nov 1, 2010 Issued
Array ( [id] => 6036337 [patent_doc_number] => 20110083198 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-04-07 [patent_title] => 'PROGRAM LICENCE MANAGEMENT TECHNIQUE IN AN AUDIO SIGNAL PROCESSING SYSTEM' [patent_app_type] => utility [patent_app_number] => 12/896710 [patent_app_country] => US [patent_app_date] => 2010-10-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 22072 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0083/20110083198.pdf [firstpage_image] =>[orig_patent_app_number] => 12896710 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/896710
Program licence management technique in an audio signal processing system Sep 30, 2010 Issued
Array ( [id] => 8849600 [patent_doc_number] => 08458800 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-06-04 [patent_title] => 'Secure smartphone' [patent_app_type] => utility [patent_app_number] => 12/896748 [patent_app_country] => US [patent_app_date] => 2010-10-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 20 [patent_figures_cnt] => 20 [patent_no_of_words] => 6372 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 255 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12896748 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/896748
Secure smartphone Sep 30, 2010 Issued
Array ( [id] => 7575694 [patent_doc_number] => 20110271350 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-11-03 [patent_title] => ' METHOD FOR PROTECTING SOFTWARE' [patent_app_type] => utility [patent_app_number] => 12/921403 [patent_app_country] => US [patent_app_date] => 2010-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5627 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0271/20110271350.pdf [firstpage_image] =>[orig_patent_app_number] => 12921403 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/921403
METHOD FOR PROTECTING SOFTWARE Jul 22, 2010 Abandoned
Array ( [id] => 5535298 [patent_doc_number] => 20090235086 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-09-17 [patent_title] => 'SERVER-SIDE BIOMETRIC AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 12/472122 [patent_app_country] => US [patent_app_date] => 2009-05-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 6345 [patent_no_of_claims] => 30 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0235/20090235086.pdf [firstpage_image] =>[orig_patent_app_number] => 12472122 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/472122
SERVER-SIDE BIOMETRIC AUTHENTICATION May 25, 2009 Abandoned
Array ( [id] => 5492040 [patent_doc_number] => 20090293111 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-11-26 [patent_title] => 'THIRD PARTY SYSTEM FOR BIOMETRIC AUTHENTICATION' [patent_app_type] => utility [patent_app_number] => 12/472232 [patent_app_country] => US [patent_app_date] => 2009-05-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 6424 [patent_no_of_claims] => 39 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0293/20090293111.pdf [firstpage_image] =>[orig_patent_app_number] => 12472232 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/472232
THIRD PARTY SYSTEM FOR BIOMETRIC AUTHENTICATION May 25, 2009 Abandoned
Array ( [id] => 6500457 [patent_doc_number] => 20100260476 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-10-14 [patent_title] => 'METHOD AND APPARATUS FOR SECURE CONFIGURATION OF ELECTRONIC DEVICES' [patent_app_type] => utility [patent_app_number] => 12/422751 [patent_app_country] => US [patent_app_date] => 2009-04-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 6345 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0260/20100260476.pdf [firstpage_image] =>[orig_patent_app_number] => 12422751 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/422751
METHOD AND APPARATUS FOR SECURE CONFIGURATION OF ELECTRONIC DEVICES Apr 12, 2009 Abandoned
Array ( [id] => 8849248 [patent_doc_number] => 08458448 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-06-04 [patent_title] => 'Method of installing a wireless network' [patent_app_type] => utility [patent_app_number] => 12/935817 [patent_app_country] => US [patent_app_date] => 2009-03-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 9 [patent_no_of_words] => 8402 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 41 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12935817 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/935817
Method of installing a wireless network Mar 26, 2009 Issued
Array ( [id] => 6140714 [patent_doc_number] => 20110010551 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-01-13 [patent_title] => 'SHARED ENCRYPTION KEY GENERATION VIA ACCELEROMETER DIGITIZATION' [patent_app_type] => utility [patent_app_number] => 12/920525 [patent_app_country] => US [patent_app_date] => 2009-03-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 2970 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0010/20110010551.pdf [firstpage_image] =>[orig_patent_app_number] => 12920525 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/920525
Shared encryption key generation via accelerometer digitization Mar 4, 2009 Issued
Array ( [id] => 5405859 [patent_doc_number] => 20090241174 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2009-09-24 [patent_title] => 'Handling Human Detection for Devices Connected Over a Network' [patent_app_type] => utility [patent_app_number] => 12/389263 [patent_app_country] => US [patent_app_date] => 2009-02-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 6515 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0241/20090241174.pdf [firstpage_image] =>[orig_patent_app_number] => 12389263 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/389263
Handling Human Detection for Devices Connected Over a Network Feb 18, 2009 Abandoned
Array ( [id] => 6527107 [patent_doc_number] => 20100212008 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-08-19 [patent_title] => 'Identification Security Elevation' [patent_app_type] => utility [patent_app_number] => 12/388679 [patent_app_country] => US [patent_app_date] => 2009-02-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 4728 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0212/20100212008.pdf [firstpage_image] =>[orig_patent_app_number] => 12388679 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/388679
Identification security elevation Feb 18, 2009 Issued
Array ( [id] => 7683806 [patent_doc_number] => 20100122335 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2010-05-13 [patent_title] => 'System and Method for Filtering Unwanted Internet Protocol Traffic Based on Blacklists' [patent_app_type] => utility [patent_app_number] => 12/269387 [patent_app_country] => US [patent_app_date] => 2008-11-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5375 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0122/20100122335.pdf [firstpage_image] =>[orig_patent_app_number] => 12269387 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/269387
System and method for filtering unwanted internet protocol traffic based on blacklists Nov 11, 2008 Issued
Array ( [id] => 8703829 [patent_doc_number] => 08397065 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-03-12 [patent_title] => 'Secure content based routing in mobile ad hoc networks' [patent_app_type] => utility [patent_app_number] => 12/288214 [patent_app_country] => US [patent_app_date] => 2008-10-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 9 [patent_no_of_words] => 6952 [patent_no_of_claims] => 29 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 117 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12288214 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/288214
Secure content based routing in mobile ad hoc networks Oct 16, 2008 Issued
Array ( [id] => 8259125 [patent_doc_number] => 08208628 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-06-26 [patent_title] => 'Systems and methods for key generation in wireless communication systems' [patent_app_type] => utility [patent_app_number] => 12/288023 [patent_app_country] => US [patent_app_date] => 2008-10-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 9 [patent_no_of_words] => 8859 [patent_no_of_claims] => 35 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 124 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12288023 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/288023
Systems and methods for key generation in wireless communication systems Oct 14, 2008 Issued
Menu