Search

Peter J. Macchiarolo

Supervisory Patent Examiner (ID: 13682, Phone: (571)272-2375 , Office: P/2856 )

Most Active Art Unit
2879
Art Unit(s)
2879, 2856, 2875, 2855
Total Applications
716
Issued Applications
485
Pending Applications
21
Abandoned Applications
212

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 19919252 [patent_doc_number] => 12294640 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2025-05-06 [patent_title] => System and method for distributed edge-cloud homomorphic compression using adaptive neural networks [patent_app_type] => utility [patent_app_number] => 18/981637 [patent_app_country] => US [patent_app_date] => 2024-12-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 23 [patent_figures_cnt] => 23 [patent_no_of_words] => 17732 [patent_no_of_claims] => 8 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 121 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18981637 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/981637
System and method for distributed edge-cloud homomorphic compression using adaptive neural networks Dec 14, 2024 Issued
Array ( [id] => 20052315 [patent_doc_number] => 20250190537 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-12 [patent_title] => Device, method, computer program and system for authorizing a computer program to carry out one or more instructions [patent_app_type] => utility [patent_app_number] => 18/967934 [patent_app_country] => US [patent_app_date] => 2024-12-04 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4481 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 62 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18967934 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/967934
Device, method, computer program and system for authorizing a computer program to carry out one or more instructions Dec 3, 2024 Pending
Array ( [id] => 20052367 [patent_doc_number] => 20250190589 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-06-12 [patent_title] => Mechanisms for destroying storage devices [patent_app_type] => utility [patent_app_number] => 18/947491 [patent_app_country] => US [patent_app_date] => 2024-11-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 0 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 85 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18947491 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/947491
Mechanisms for destroying storage devices Nov 13, 2024 Pending
Array ( [id] => 19697442 [patent_doc_number] => 20250015987 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-01-09 [patent_title] => LIMITING USE OF ENCRYPTION KEYS IN AN INTEGRATED CIRCUIT DEVICE [patent_app_type] => utility [patent_app_number] => 18/893577 [patent_app_country] => US [patent_app_date] => 2024-09-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 13610 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 88 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18893577 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/893577
LIMITING USE OF ENCRYPTION KEYS IN AN INTEGRATED CIRCUIT DEVICE Sep 22, 2024 Pending
Array ( [id] => 19864956 [patent_doc_number] => 20250103742 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-03-27 [patent_title] => DATA SECURITY MANAGEMENT CONTROL SYSTEM AND METHOD [patent_app_type] => utility [patent_app_number] => 18/890719 [patent_app_country] => US [patent_app_date] => 2024-09-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 4359 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -8 [patent_words_short_claim] => 56 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18890719 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/890719
DATA SECURITY MANAGEMENT CONTROL SYSTEM AND METHOD Sep 18, 2024 Pending
Array ( [id] => 20449105 [patent_doc_number] => 20260005831 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2026-01-01 [patent_title] => CODEBOOK-BASED HOMOMORPHIC ENCRYPTION FOR EFFICIENT AND PRIVACY-PRESERVING DATA PROCESSING [patent_app_type] => utility [patent_app_number] => 18/888656 [patent_app_country] => US [patent_app_date] => 2024-09-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11577 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 96 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18888656 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/888656
Codebook-based homomorphic encryption for efficient and privacy-preserving data processing Sep 17, 2024 Issued
Array ( [id] => 19805205 [patent_doc_number] => 20250071130 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-02-27 [patent_title] => CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM [patent_app_type] => utility [patent_app_number] => 18/812957 [patent_app_country] => US [patent_app_date] => 2024-08-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 44533 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -8 [patent_words_short_claim] => 77 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18812957 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/812957
CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM Aug 21, 2024 Pending
Array ( [id] => 19633476 [patent_doc_number] => 20240411925 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-12 [patent_title] => VERIFIABLE CONSENT FOR PRIVACY PROTECTION [patent_app_type] => utility [patent_app_number] => 18/811166 [patent_app_country] => US [patent_app_date] => 2024-08-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 15285 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18811166 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/811166
VERIFIABLE CONSENT FOR PRIVACY PROTECTION Aug 20, 2024 Pending
Array ( [id] => 19636091 [patent_doc_number] => 20240414540 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-12 [patent_title] => ELASTIC SECURITY SERVICES LOAD BALANCING IN A WIRELESS MESH NETWORK [patent_app_type] => utility [patent_app_number] => 18/809807 [patent_app_country] => US [patent_app_date] => 2024-08-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7807 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 208 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18809807 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/809807
ELASTIC SECURITY SERVICES LOAD BALANCING IN A WIRELESS MESH NETWORK Aug 19, 2024 Pending
Array ( [id] => 20423812 [patent_doc_number] => 20250385897 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-12-18 [patent_title] => USER DEVICE CHARACTERIZATION METHOD BASED ON NETWORK DATA TRAFFIC INFORMATION, AND NETWORK ACCESS CONTROL METHOD THEREOF [patent_app_type] => utility [patent_app_number] => 18/799824 [patent_app_country] => US [patent_app_date] => 2024-08-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 2440 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -5 [patent_words_short_claim] => 153 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18799824 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/799824
USER DEVICE CHARACTERIZATION METHOD BASED ON NETWORK DATA TRAFFIC INFORMATION, AND NETWORK ACCESS CONTROL METHOD THEREOF Aug 8, 2024 Pending
Array ( [id] => 19742503 [patent_doc_number] => 12219360 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2025-02-04 [patent_title] => Cellular IoT security using dynamic policy-driven mechanisms for threat mitigation [patent_app_type] => utility [patent_app_number] => 18/783154 [patent_app_country] => US [patent_app_date] => 2024-07-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 8177 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 228 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18783154 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/783154
Cellular IoT security using dynamic policy-driven mechanisms for threat mitigation Jul 23, 2024 Issued
Array ( [id] => 19706050 [patent_doc_number] => 12200102 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2025-01-14 [patent_title] => Codebook-based homomorphic encryption for efficient and privacy-preserving data processing [patent_app_type] => utility [patent_app_number] => 18/755627 [patent_app_country] => US [patent_app_date] => 2024-06-26 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 12 [patent_figures_cnt] => 12 [patent_no_of_words] => 16445 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 135 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18755627 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/755627
Codebook-based homomorphic encryption for efficient and privacy-preserving data processing Jun 25, 2024 Issued
Array ( [id] => 19660790 [patent_doc_number] => 20240427855 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-12-26 [patent_title] => COMMUNICATION CONFIDENTIALITY METHOD FOR APPLICATIONS IN COMMUNICATION CONFIDENTIALITY SYSTEMS AND COMMUNICATION SERVERS [patent_app_type] => utility [patent_app_number] => 18/749054 [patent_app_country] => US [patent_app_date] => 2024-06-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5911 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -8 [patent_words_short_claim] => 132 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18749054 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/749054
COMMUNICATION CONFIDENTIALITY METHOD FOR APPLICATIONS IN COMMUNICATION CONFIDENTIALITY SYSTEMS AND COMMUNICATION SERVERS Jun 19, 2024 Issued
Array ( [id] => 19470020 [patent_doc_number] => 20240323690 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-09-26 [patent_title] => END-TO-END ENCRYPTION WITH DISTRIBUTED KEY MANAGEMENT IN A TRACKING DEVICE ENVIRONMENT [patent_app_type] => utility [patent_app_number] => 18/680722 [patent_app_country] => US [patent_app_date] => 2024-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 20191 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 196 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18680722 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/680722
End-to-end encryption with distributed key management in a tracking device environment May 30, 2024 Issued
Array ( [id] => 20595610 [patent_doc_number] => 12579329 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2026-03-17 [patent_title] => Input/output interface security [patent_app_type] => utility [patent_app_number] => 18/678004 [patent_app_country] => US [patent_app_date] => 2024-05-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 12111 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 152 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18678004 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/678004
Input/output interface security May 29, 2024 Issued
Array ( [id] => 19981043 [patent_doc_number] => 12348538 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2025-07-01 [patent_title] => Intrusion detection using a heartbeat [patent_app_type] => utility [patent_app_number] => 18/672978 [patent_app_country] => US [patent_app_date] => 2024-05-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 9539 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 165 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18672978 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/672978
Intrusion detection using a heartbeat May 22, 2024 Issued
Array ( [id] => 19606439 [patent_doc_number] => 20240397319 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-11-28 [patent_title] => SECURE TRAIN COMMUNICATION TECHNIQUES [patent_app_type] => utility [patent_app_number] => 18/667416 [patent_app_country] => US [patent_app_date] => 2024-05-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11162 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 91 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18667416 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/667416
SECURE TRAIN COMMUNICATION TECHNIQUES May 16, 2024 Pending
Array ( [id] => 20140161 [patent_doc_number] => 20250247205 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2025-07-31 [patent_title] => SAMPLING FROM BINOMIAL DISTRIBUTION IN SECURE MULTI-PARTY COMPUTATION [patent_app_type] => utility [patent_app_number] => 18/664052 [patent_app_country] => US [patent_app_date] => 2024-05-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5313 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 109 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18664052 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/664052
Sampling from binomial distribution in secure multi-party computation May 13, 2024 Issued
Array ( [id] => 19408136 [patent_doc_number] => 20240291647 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-08-29 [patent_title] => SYSTEM, APPARATUS, AND METHOD FOR HARDWARE BASED CRYPTOGRAPHY [patent_app_type] => utility [patent_app_number] => 18/652844 [patent_app_country] => US [patent_app_date] => 2024-05-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6032 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 189 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18652844 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/652844
System, apparatus, and method for hardware based cryptography May 1, 2024 Issued
Array ( [id] => 19391686 [patent_doc_number] => 20240281556 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2024-08-22 [patent_title] => SECURITY DESCRIPTION FRAMEWORK [patent_app_type] => utility [patent_app_number] => 18/652305 [patent_app_country] => US [patent_app_date] => 2024-05-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 14801 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 56 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 18652305 [rel_patent_id] =>[rel_patent_doc_number] =>)
18/652305
Security description framework Apr 30, 2024 Issued
Menu