USPTO Examiner POWERS WILLIAM S - Art Unit 2419

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
17130070IMAGE BASED PASSPHRASE FOR AUTHENTICATIONDecember 2020May 2022Allow1710NoNo
17124601System, Device, and Method of Determining Personal Characteristics of a UserDecember 2020January 2023Abandon2520NoNo
17107013MOBILE DEVICE INTERFACENovember 2020May 2022Allow1710NoNo
17101694SYSTEMS AND METHODS FOR THE SECURED ENTRY AND STORAGE OF SENSITIVE DATANovember 2020March 2022Allow1610YesNo
17090495MANAGING IDENTIFIER PRIVACYNovember 2020March 2022Allow1710NoNo
17035525SYSTEMS AND METHODS OF PROVIDING ACCESS TO SECURE DATASeptember 2020December 2021Allow1510NoNo
17026987GEOLOCATION BASED FILE ENCRYPTIONSeptember 2020January 2023Allow2810NoNo
17005533HARDWARE SECURITY MODULE SYSTEMS AND METHODSAugust 2020November 2020Allow210YesNo
16944127User Configurable Alert Notifications Applicable to Search Query ResultsJuly 2020December 2021Allow1710NoNo
16938548SYSTEM AND METHOD OF OPERATING AN INFORMATION HANDLING SYSTEMJuly 2020October 2022Allow2700NoNo
16929312METHOD AND COMMUNICATION UNIT FOR THE CRYPTOGRAPHICALLY PROTECTED UNIDIRECTIONAL DATA TRANSMISSION OF PAYLOAD DATA BETWEEN TWO NETWORKSJuly 2020June 2022Allow2300NoNo
16909612SYSTEM AND METHOD FOR TRANSFERRING STATES BETWEEN ELECTRONIC DEVICESJune 2020January 2021Allow710NoNo
16956180SYSTEM FOR SECURING DEPLOYED SECURITY CAMERASJune 2020August 2022Allow2610YesNo
16901204METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENTJune 2020November 2020Allow510YesNo
16886874Passive Physical Layer Distinct Native Attribute Cyber Security MonitorMay 2020October 2022Allow2910NoNo
16881566Entity Group Behavior ProfilingMay 2020January 2022Allow1940YesNo
16872067System and Method for Performing Remote Security Assessment of Firewalled ComputerMay 2020April 2021Allow1110NoNo
16870705MOBILE RISK ASSESSMENTMay 2020June 2021Allow1320NoNo
16868452METHOD DEVICE AND SYSTEM FOR POLICY BASED PACKET PROCESSINGMay 2020August 2022Allow2710YesNo
16862956DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISKApril 2020June 2021Abandon1320YesNo
16862952DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISKApril 2020June 2021Allow1330YesNo
16862944DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISKApril 2020May 2021Allow1330YesNo
16862948DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISKApril 2020June 2021Allow1330YesNo
16856027Secure Hardware Backdoor for Digital DevicesApril 2020June 2022Allow2610NoNo
16856773PASSWORD-LESS WIRELESS AUTHENTICATIONApril 2020July 2022Allow2710NoNo
16848146HYBRID CLOUD IDENTITY MAPPING INFRASTRUCTUREApril 2020November 2021Allow1930YesNo
16827127TECHNIQUES FOR SHARING NETWORK SECURITY EVENT INFORMATIONMarch 2020August 2021Allow1710NoNo
16817036DRM PLUGINSMarch 2020October 2020Allow810NoNo
16811629MANAGING IDENTIFIER PRIVACYMarch 2020July 2020Allow410NoNo
16808493PRIVACY MANAGEMENT SYSTEMS AND METHODSMarch 2020May 2021Allow1530YesNo
16744888METHODS, SYSTEMS, AND MEDIA FOR PROTECTED NEAR-FIELD COMMUNICATIONSJanuary 2020February 2022Allow2500NoNo
16735605Inter-Application Delegated AuthenticationJanuary 2020January 2021Allow1310NoNo
16720429SYSTEMS AND METHODS FOR DATA ACCESS CONTROL AND ACCOUNT MANAGEMENTDecember 2019July 2021Allow1930YesNo
16700049DATA PROCESSING SYSTEMS AND METHODS FOR EFFICIENTLY ASSESSING THE RISK OF PRIVACY CAMPAIGNSDecember 2019April 2020Allow510NoNo
16687203COMMAND INJECTION IDENTIFICATIONNovember 2019March 2022Allow2810NoNo
16683664INFORMATION PROCESSING APPARATUS, SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUMNovember 2019March 2022Allow2820NoNo
16673147SYSTEMS AND METHODS FOR THE SECURED ENTRY AND STORAGE OF SENSITIVE DATANovember 2019July 2020Allow910NoNo
16566988MONITORING PARAMETERS OF CONTROLLERS FOR UNAUTHORIZED MODIFICATIONSeptember 2019May 2022Allow3210YesNo
16538896PREVENTING UNAUTHORIZED ACCESS TO SECURED INFORMATION SYSTEMS BY INJECTING DEVICE DATA COLLECTORSAugust 2019May 2020Allow910NoNo
16532330Method and system for protecting user privacyAugust 2019March 2020Allow710YesNo
16429317SYSTEMS AND METHODS OF PROVIDING ACCESS TO SECURE DATAJune 2019June 2020Allow1210NoNo
16340603METHOD FOR ESTABLISHING A CONNECTION OF A MOBILE TERMINAL TO A MOBILE RADIO COMMUNICATION NETWORK AND COMMUNICATION NETWORK DEVICEApril 2019November 2022Allow4340NoNo
16374425MANAGING IDENTIFIER PRIVACYApril 2019December 2019Allow810NoNo
16351877Key-Attestation-Contingent Certificate IssuanceMarch 2019March 2020Allow1210NoNo
16286011VEHICLE INTERFACEFebruary 2019July 2020Allow1720NoNo
16325720ADAPTER APPARATUS AND PROCESSING METHODFebruary 2019June 2022Abandon4010NoNo
16273353SENTINEL APPLIANCE IN AN INTERNET OF THINGS REALMFebruary 2019April 2020Allow1410NoNo
16267696Entity Group Behavior ProfilingFebruary 2019July 2020Abandon1820YesNo
16247851SYSTEM AND METHOD FOR TRANSFERRING STATES BETWEEN ELECTRONIC DEVICESJanuary 2019February 2020Allow1310NoNo
16228166SYSTEMS AND METHODS FOR IDENTIFYING PRIVACY LEAKAGE INFORMATIONDecember 2018August 2021Allow3200NoNo
16215530Secure Data Transmission Using Natural LanguageDecember 2018March 2020Allow1520NoNo
16213683UNPREDICTABLE NUMBER GENERATIONDecember 2018July 2020Abandon1920YesNo
16213089NETWORK SEGMENTATION BY AUTOMATICALLY GENERATED SECURITY GROUPSDecember 2018September 2021Allow3420YesNo
16207817METHOD FOR WRITING A SET OF INFORMATION ENCRYPTED IN AN EXTERNAL MEMORY OF AN INTEGRATED CIRCUIT AND CORRESPONDING INTEGRATED CIRCUITDecember 2018December 2021Abandon3710NoNo
16208407TAMPER-RESISTANT SOFTWARE DEVELOPMENT LIFECYCLE PROVENANCEDecember 2018September 2021Allow3310NoNo
16207927METHOD OF HYBRID SEARCHABLE ENCRYPTION AND SYSTEM USING THE SAMEDecember 2018June 2020Allow1910NoNo
16306707TERMINAL DEVICE, KEY DISTRIBUTION MANAGEMENT DEVICE, SERVER-CLIENT SYSTEM, COMMUNICATION METHOD, AND PROGRAMSDecember 2018July 2022Allow4430YesNo
16206721ANONYMIZATION OF USER DATA FOR PRIVACY ACROSS DISTRIBUTED COMPUTING SYSTEMSNovember 2018September 2021Allow3401NoNo
16206733NETWORK SECURITY ASSESSMENT USING A NETWORK TRAFFIC PARAMETERNovember 2018August 2021Allow3210YesNo
16202494DRM PLUGINSNovember 2018December 2019Allow1210NoNo
16198838METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENTNovember 2018February 2020Allow1510NoNo
16177394User Configurable Alert Notifications Applicable to Search Query ResultsOctober 2018April 2020Allow1810NoNo
16166046Methods and Apparatus for Using Smart Environment Devices Via Application Program InterfacesOctober 2018June 2020Abandon2020YesNo
16163900HYBRID CLOUD IDENTITY MAPPING INFRASTRUCTUREOctober 2018January 2020Allow1510NoNo
16160913ANALYTIC-BASED SECURITY MONITORING SYSTEM AND METHODOctober 2018March 2020Allow1710NoNo
16151085TECHNIQUES FOR SHARING NETWORK SECURITY EVENT INFORMATIONOctober 2018December 2019Allow1430YesNo
16150220ALERTING SYSTEMS AND METHODSOctober 2018April 2021Allow3100NoNo
16149796DATA ACCESS AND OWNERSHIP MANAGEMENTOctober 2018March 2020Allow1820NoNo
16148447SYSTEMS AND METHODS FOR SLOGAN BASED SHARING OF LIVING SAAS OBJECTSOctober 2018September 2021Allow3510YesNo
16148375SYSTEMS AND METHODS FOR OFFLINE USAGE OF SAAS APPLICATIONSOctober 2018January 2022Allow4021YesNo
16134942Programmable Unit for Metadata ProcessingSeptember 2018May 2020Allow2010NoNo
16127364ACCESS TO DATA BROADCAST IN ENCRYPTED FORM BASED ON BLOCKCHAINSeptember 2018July 2021Allow3410NoNo
16128429Wireless Earpieces for Hub CommunicationsSeptember 2018October 2021Allow3820NoNo
16126932REAL-TIME DETECTION OF PRIVACY LEAKS BASED ON LINGUISTIC FEATURESSeptember 2018January 2021Allow2810YesNo
16121238INFORMATION PROCESSING DEVICE AND NON-TRANSITORY COMPUTER READABLE MEDIUMSeptember 2018December 2021Abandon4040YesNo
16120708DATA SECURITY ACROSS DATA RESIDENCY RESTRICTION BOUNDARIESSeptember 2018January 2021Allow2910YesNo
16120489FINE-GRAINED ACCESS CONTROL TO DATASETSSeptember 2018June 2021Allow3430YesNo
16120812SYSTEMS AND METHODS FOR HYBRID BLOCKCHAIN CONTROLSeptember 2018February 2021Allow2900NoNo
16120721METHODS AND SYSTEMS OF SECURELY TRANSFERRING DATASeptember 2018June 2021Allow3310YesNo
16059053System, Device, and Method of Determining Personal Characteristics of a UserAugust 2018February 2021Abandon3020NoNo
16047016STRONG PASSWORD BY CONVENTION METHODS AND SYSTEMSJuly 2018September 2021Abandon3820NoNo
16046923DYNAMIC DISCOVERY RANGE FOR ONLINE SESSIONSJuly 2018October 2020Allow2700YesNo
16072912USER INTERFACE ELEMENTS WITH FINGERPRINT VALIDATIONJuly 2018July 2023Abandon6040YesYes
16072978DETECTING MALWARE ON SPDY CONNECTIONSJuly 2018January 2021Allow2920YesNo
16024726SYSTEM AND METHOD FOR PERFORMING REMOTE SECURITY ASSESSMENT OF FIREWALLED COMPUTERJune 2018January 2020Allow1810NoNo
16013492SYSTEMS AND METHODS FOR SECURE DETOKENIZATIONJune 2018January 2020Allow1910NoNo
16004754DATA TRANSFER PREVENTIONJune 2018October 2020Allow2920YesNo
16004947IMAGE BASED PASSPHRASE FOR AUTHENTICATIONJune 2018August 2020Allow2710YesNo
16005158SYSTEM AND METHOD FOR DETECTING COMPROMISED DATAJune 2018July 2020Allow2510NoNo
15993326System and Method for Location-Based Access ControlMay 2018April 2020Abandon2240YesNo
15880068SYSTEMS AND METHODS FOR AUTHENTICATING PLATFORM TRUST IN A NETWORK FUNCTION VIRTUALIZATION ENVIRONMENTJanuary 2018October 2020Allow3310YesNo
15880074REINFORCEMENT LEARNING-BASED ENCRYPTION AND DECRYPTION METHOD AND CLIENT AND SERVER SYSTEM PERFORMING THE SAMEJanuary 2018March 2020Allow2610NoNo
15829732SYSTEMS AND METHODS FOR AIDA BASED EXPLOIT SELECTIONDecember 2017May 2023Allow6080YesYes
15788570Application Graph BuilderOctober 2017January 2021Allow3930NoNo
15672555SYSTEM AND METHOD FOR USER IDENTIFICATION AND AUTHENTICATIONAugust 2017February 2020Allow3020NoNo
15639443MULTICHANNEL DEVICE UTILIZING A CENTRALIZED OUT-OF-BAND AUTHENTICATION SYSTEM (COBAS)June 2017July 2020Abandon3640NoNo
15385292SYSTEM AND METHOD FOR DISTRIBUTED, POLICY-BASED CONFIDENTIALITY MANAGEMENTDecember 2016November 2019Abandon3430NoNo
15341572Control of Internet Browsing in a Secure EnvironmentNovember 2016February 2020Allow4020YesYes
15089216MULTICHANNEL DEVICE UTILIZING A CENTRALIZED OUT-OF-BAND AUTHENTICATION SYSTEM (COBAS)April 2016July 2020Abandon5140NoNo
14997763System and Method for Prediction of Future Threat ActionsJanuary 2016February 2020Allow4940YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner POWERS, WILLIAM S.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
6
Examiner Affirmed
4
(66.7%)
Examiner Reversed
2
(33.3%)
Reversal Percentile
52.2%
Higher than average

What This Means

With a 33.3% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
7
Allowed After Appeal Filing
2
(28.6%)
Not Allowed After Appeal Filing
5
(71.4%)
Filing Benefit Percentile
43.4%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 28.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner POWERS, WILLIAM S - Prosecution Strategy Guide

Executive Summary

Examiner POWERS, WILLIAM S works in Art Unit 2419 and has examined 103 patent applications in our dataset. With an allowance rate of 84.5%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 25 months.

Allowance Patterns

Examiner POWERS, WILLIAM S's allowance rate of 84.5% places them in the 61% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by POWERS, WILLIAM S receive 1.83 office actions before reaching final disposition. This places the examiner in the 39% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by POWERS, WILLIAM S is 25 months. This places the examiner in the 77% percentile for prosecution speed. Applications move through prosecution relatively quickly with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a -3.2% benefit to allowance rate for applications examined by POWERS, WILLIAM S. This interview benefit is in the 8% percentile among all examiners. Note: Interviews show limited statistical benefit with this examiner compared to others, though they may still be valuable for clarifying issues.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 25.0% of applications are subsequently allowed. This success rate is in the 41% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 29.7% of cases where such amendments are filed. This entry rate is in the 44% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 7% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 33.3% of appeals filed. This is in the 5% percentile among all examiners. Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.

Petition Practice

When applicants file petitions regarding this examiner's actions, 43.5% are granted (fully or in part). This grant rate is in the 34% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

    Relevant MPEP Sections for Prosecution Strategy

    • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
    • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
    • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
    • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
    • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
    • MPEP § 1214.07: Reopening prosecution after appeal

    Important Disclaimer

    Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

    No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

    Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

    Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.