
Michael J. Carone
Supervisory Patent Examiner (ID: 3588, Phone: (303)297-4220 , Office: P/3600 )
| Most Active Art Unit | 2201 |
| Art Unit(s) | 3641, 2201, 3616, 3643, 3600 |
| Total Applications | 774 |
| Issued Applications | 729 |
| Pending Applications | 6 |
| Abandoned Applications | 39 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 7820152
[patent_doc_number] => 20120066772
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-03-15
[patent_title] => 'Scalable Anti-Replay Windowing'
[patent_app_type] => utility
[patent_app_number] => 13/300801
[patent_app_country] => US
[patent_app_date] => 2011-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3356
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0066/20120066772.pdf
[firstpage_image] =>[orig_patent_app_number] => 13300801
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/300801 | Scalable anti-replay windowing | Nov 20, 2011 | Issued |
Array
(
[id] => 9302393
[patent_doc_number] => 08650638
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-02-11
[patent_title] => 'System and method for detecting a file embedded in an arbitrary location and determining the reputation of the file'
[patent_app_type] => utility
[patent_app_number] => 13/276197
[patent_app_country] => US
[patent_app_date] => 2011-10-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5453
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 162
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13276197
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/276197 | System and method for detecting a file embedded in an arbitrary location and determining the reputation of the file | Oct 17, 2011 | Issued |
Array
(
[id] => 9242552
[patent_doc_number] => 08607358
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-12-10
[patent_title] => 'Storing encrypted objects'
[patent_app_type] => utility
[patent_app_number] => 13/110323
[patent_app_country] => US
[patent_app_date] => 2011-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13271
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 238
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13110323
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/110323 | Storing encrypted objects | May 17, 2011 | Issued |
Array
(
[id] => 9302412
[patent_doc_number] => 08650657
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-02-11
[patent_title] => 'Storing encrypted objects'
[patent_app_type] => utility
[patent_app_number] => 13/110336
[patent_app_country] => US
[patent_app_date] => 2011-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13029
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 253
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13110336
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/110336 | Storing encrypted objects | May 17, 2011 | Issued |
Array
(
[id] => 9236284
[patent_doc_number] => 08601600
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-12-03
[patent_title] => 'Storing encrypted objects'
[patent_app_type] => utility
[patent_app_number] => 13/110306
[patent_app_country] => US
[patent_app_date] => 2011-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 13171
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13110306
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/110306 | Storing encrypted objects | May 17, 2011 | Issued |
Array
(
[id] => 6189319
[patent_doc_number] => 20110126012
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-26
[patent_title] => 'METHOD AND SYSTEM FOR SECURE DATA COLLECTION AND DISTRIBUTION'
[patent_app_type] => utility
[patent_app_number] => 12/956065
[patent_app_country] => US
[patent_app_date] => 2010-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 69
[patent_figures_cnt] => 69
[patent_no_of_words] => 6467
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0126/20110126012.pdf
[firstpage_image] =>[orig_patent_app_number] => 12956065
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/956065 | Method and system for secure data collection and distribution | Nov 29, 2010 | Issued |
Array
(
[id] => 5942964
[patent_doc_number] => 20110103584
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-05
[patent_title] => 'PROTECTION OF A CIPHERING KEY'
[patent_app_type] => utility
[patent_app_number] => 12/917792
[patent_app_country] => US
[patent_app_date] => 2010-11-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3904
[patent_no_of_claims] => 8
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0103/20110103584.pdf
[firstpage_image] =>[orig_patent_app_number] => 12917792
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/917792 | Protection of a ciphering key | Nov 1, 2010 | Issued |
Array
(
[id] => 6036337
[patent_doc_number] => 20110083198
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-04-07
[patent_title] => 'PROGRAM LICENCE MANAGEMENT TECHNIQUE IN AN AUDIO SIGNAL PROCESSING SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 12/896710
[patent_app_country] => US
[patent_app_date] => 2010-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 22072
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0083/20110083198.pdf
[firstpage_image] =>[orig_patent_app_number] => 12896710
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/896710 | Program licence management technique in an audio signal processing system | Sep 30, 2010 | Issued |
Array
(
[id] => 8849600
[patent_doc_number] => 08458800
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-06-04
[patent_title] => 'Secure smartphone'
[patent_app_type] => utility
[patent_app_number] => 12/896748
[patent_app_country] => US
[patent_app_date] => 2010-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 6372
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 255
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12896748
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/896748 | Secure smartphone | Sep 30, 2010 | Issued |
Array
(
[id] => 7575694
[patent_doc_number] => 20110271350
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-11-03
[patent_title] => ' METHOD FOR PROTECTING SOFTWARE'
[patent_app_type] => utility
[patent_app_number] => 12/921403
[patent_app_country] => US
[patent_app_date] => 2010-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5627
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0271/20110271350.pdf
[firstpage_image] =>[orig_patent_app_number] => 12921403
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/921403 | METHOD FOR PROTECTING SOFTWARE | Jul 22, 2010 | Abandoned |
Array
(
[id] => 5535298
[patent_doc_number] => 20090235086
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-09-17
[patent_title] => 'SERVER-SIDE BIOMETRIC AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 12/472122
[patent_app_country] => US
[patent_app_date] => 2009-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6345
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20090235086.pdf
[firstpage_image] =>[orig_patent_app_number] => 12472122
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/472122 | SERVER-SIDE BIOMETRIC AUTHENTICATION | May 25, 2009 | Abandoned |
Array
(
[id] => 5492040
[patent_doc_number] => 20090293111
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-11-26
[patent_title] => 'THIRD PARTY SYSTEM FOR BIOMETRIC AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 12/472232
[patent_app_country] => US
[patent_app_date] => 2009-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6424
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0293/20090293111.pdf
[firstpage_image] =>[orig_patent_app_number] => 12472232
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/472232 | THIRD PARTY SYSTEM FOR BIOMETRIC AUTHENTICATION | May 25, 2009 | Abandoned |
Array
(
[id] => 6500457
[patent_doc_number] => 20100260476
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-10-14
[patent_title] => 'METHOD AND APPARATUS FOR SECURE CONFIGURATION OF ELECTRONIC DEVICES'
[patent_app_type] => utility
[patent_app_number] => 12/422751
[patent_app_country] => US
[patent_app_date] => 2009-04-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6345
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0260/20100260476.pdf
[firstpage_image] =>[orig_patent_app_number] => 12422751
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/422751 | METHOD AND APPARATUS FOR SECURE CONFIGURATION OF ELECTRONIC DEVICES | Apr 12, 2009 | Abandoned |
Array
(
[id] => 8849248
[patent_doc_number] => 08458448
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-06-04
[patent_title] => 'Method of installing a wireless network'
[patent_app_type] => utility
[patent_app_number] => 12/935817
[patent_app_country] => US
[patent_app_date] => 2009-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 8402
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 41
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12935817
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/935817 | Method of installing a wireless network | Mar 26, 2009 | Issued |
Array
(
[id] => 6140714
[patent_doc_number] => 20110010551
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-01-13
[patent_title] => 'SHARED ENCRYPTION KEY GENERATION VIA ACCELEROMETER DIGITIZATION'
[patent_app_type] => utility
[patent_app_number] => 12/920525
[patent_app_country] => US
[patent_app_date] => 2009-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2970
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0010/20110010551.pdf
[firstpage_image] =>[orig_patent_app_number] => 12920525
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/920525 | Shared encryption key generation via accelerometer digitization | Mar 4, 2009 | Issued |
Array
(
[id] => 5405859
[patent_doc_number] => 20090241174
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-09-24
[patent_title] => 'Handling Human Detection for Devices Connected Over a Network'
[patent_app_type] => utility
[patent_app_number] => 12/389263
[patent_app_country] => US
[patent_app_date] => 2009-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6515
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0241/20090241174.pdf
[firstpage_image] =>[orig_patent_app_number] => 12389263
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/389263 | Handling Human Detection for Devices Connected Over a Network | Feb 18, 2009 | Abandoned |
Array
(
[id] => 6527107
[patent_doc_number] => 20100212008
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-08-19
[patent_title] => 'Identification Security Elevation'
[patent_app_type] => utility
[patent_app_number] => 12/388679
[patent_app_country] => US
[patent_app_date] => 2009-02-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4728
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0212/20100212008.pdf
[firstpage_image] =>[orig_patent_app_number] => 12388679
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/388679 | Identification security elevation | Feb 18, 2009 | Issued |
Array
(
[id] => 7683806
[patent_doc_number] => 20100122335
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-05-13
[patent_title] => 'System and Method for Filtering Unwanted Internet Protocol Traffic Based on Blacklists'
[patent_app_type] => utility
[patent_app_number] => 12/269387
[patent_app_country] => US
[patent_app_date] => 2008-11-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5375
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0122/20100122335.pdf
[firstpage_image] =>[orig_patent_app_number] => 12269387
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/269387 | System and method for filtering unwanted internet protocol traffic based on blacklists | Nov 11, 2008 | Issued |
Array
(
[id] => 8703829
[patent_doc_number] => 08397065
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-03-12
[patent_title] => 'Secure content based routing in mobile ad hoc networks'
[patent_app_type] => utility
[patent_app_number] => 12/288214
[patent_app_country] => US
[patent_app_date] => 2008-10-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 6952
[patent_no_of_claims] => 29
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 117
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12288214
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/288214 | Secure content based routing in mobile ad hoc networks | Oct 16, 2008 | Issued |
Array
(
[id] => 8259125
[patent_doc_number] => 08208628
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-06-26
[patent_title] => 'Systems and methods for key generation in wireless communication systems'
[patent_app_type] => utility
[patent_app_number] => 12/288023
[patent_app_country] => US
[patent_app_date] => 2008-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 9
[patent_no_of_words] => 8859
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12288023
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/288023 | Systems and methods for key generation in wireless communication systems | Oct 14, 2008 | Issued |