Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 17130070 | IMAGE BASED PASSPHRASE FOR AUTHENTICATION | December 2020 | May 2022 | Allow | 17 | 1 | 0 | No | No |
| 17124601 | System, Device, and Method of Determining Personal Characteristics of a User | December 2020 | January 2023 | Abandon | 25 | 2 | 0 | No | No |
| 17107013 | MOBILE DEVICE INTERFACE | November 2020 | May 2022 | Allow | 17 | 1 | 0 | No | No |
| 17101694 | SYSTEMS AND METHODS FOR THE SECURED ENTRY AND STORAGE OF SENSITIVE DATA | November 2020 | March 2022 | Allow | 16 | 1 | 0 | Yes | No |
| 17090495 | MANAGING IDENTIFIER PRIVACY | November 2020 | March 2022 | Allow | 17 | 1 | 0 | No | No |
| 17035525 | SYSTEMS AND METHODS OF PROVIDING ACCESS TO SECURE DATA | September 2020 | December 2021 | Allow | 15 | 1 | 0 | No | No |
| 17026987 | GEOLOCATION BASED FILE ENCRYPTION | September 2020 | January 2023 | Allow | 28 | 1 | 0 | No | No |
| 17005533 | HARDWARE SECURITY MODULE SYSTEMS AND METHODS | August 2020 | November 2020 | Allow | 2 | 1 | 0 | Yes | No |
| 16944127 | User Configurable Alert Notifications Applicable to Search Query Results | July 2020 | December 2021 | Allow | 17 | 1 | 0 | No | No |
| 16938548 | SYSTEM AND METHOD OF OPERATING AN INFORMATION HANDLING SYSTEM | July 2020 | October 2022 | Allow | 27 | 0 | 0 | No | No |
| 16929312 | METHOD AND COMMUNICATION UNIT FOR THE CRYPTOGRAPHICALLY PROTECTED UNIDIRECTIONAL DATA TRANSMISSION OF PAYLOAD DATA BETWEEN TWO NETWORKS | July 2020 | June 2022 | Allow | 23 | 0 | 0 | No | No |
| 16909612 | SYSTEM AND METHOD FOR TRANSFERRING STATES BETWEEN ELECTRONIC DEVICES | June 2020 | January 2021 | Allow | 7 | 1 | 0 | No | No |
| 16956180 | SYSTEM FOR SECURING DEPLOYED SECURITY CAMERAS | June 2020 | August 2022 | Allow | 26 | 1 | 0 | Yes | No |
| 16901204 | METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENT | June 2020 | November 2020 | Allow | 5 | 1 | 0 | Yes | No |
| 16886874 | Passive Physical Layer Distinct Native Attribute Cyber Security Monitor | May 2020 | October 2022 | Allow | 29 | 1 | 0 | No | No |
| 16881566 | Entity Group Behavior Profiling | May 2020 | January 2022 | Allow | 19 | 4 | 0 | Yes | No |
| 16872067 | System and Method for Performing Remote Security Assessment of Firewalled Computer | May 2020 | April 2021 | Allow | 11 | 1 | 0 | No | No |
| 16870705 | MOBILE RISK ASSESSMENT | May 2020 | June 2021 | Allow | 13 | 2 | 0 | No | No |
| 16868452 | METHOD DEVICE AND SYSTEM FOR POLICY BASED PACKET PROCESSING | May 2020 | August 2022 | Allow | 27 | 1 | 0 | Yes | No |
| 16862956 | DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISK | April 2020 | June 2021 | Abandon | 13 | 2 | 0 | Yes | No |
| 16862952 | DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISK | April 2020 | June 2021 | Allow | 13 | 3 | 0 | Yes | No |
| 16862944 | DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISK | April 2020 | May 2021 | Allow | 13 | 3 | 0 | Yes | No |
| 16862948 | DATA PROCESSING AND SCANNING SYSTEMS FOR ASSESSING VENDOR RISK | April 2020 | June 2021 | Allow | 13 | 3 | 0 | Yes | No |
| 16856027 | Secure Hardware Backdoor for Digital Devices | April 2020 | June 2022 | Allow | 26 | 1 | 0 | No | No |
| 16856773 | PASSWORD-LESS WIRELESS AUTHENTICATION | April 2020 | July 2022 | Allow | 27 | 1 | 0 | No | No |
| 16848146 | HYBRID CLOUD IDENTITY MAPPING INFRASTRUCTURE | April 2020 | November 2021 | Allow | 19 | 3 | 0 | Yes | No |
| 16827127 | TECHNIQUES FOR SHARING NETWORK SECURITY EVENT INFORMATION | March 2020 | August 2021 | Allow | 17 | 1 | 0 | No | No |
| 16817036 | DRM PLUGINS | March 2020 | October 2020 | Allow | 8 | 1 | 0 | No | No |
| 16811629 | MANAGING IDENTIFIER PRIVACY | March 2020 | July 2020 | Allow | 4 | 1 | 0 | No | No |
| 16808493 | PRIVACY MANAGEMENT SYSTEMS AND METHODS | March 2020 | May 2021 | Allow | 15 | 3 | 0 | Yes | No |
| 16744888 | METHODS, SYSTEMS, AND MEDIA FOR PROTECTED NEAR-FIELD COMMUNICATIONS | January 2020 | February 2022 | Allow | 25 | 0 | 0 | No | No |
| 16735605 | Inter-Application Delegated Authentication | January 2020 | January 2021 | Allow | 13 | 1 | 0 | No | No |
| 16720429 | SYSTEMS AND METHODS FOR DATA ACCESS CONTROL AND ACCOUNT MANAGEMENT | December 2019 | July 2021 | Allow | 19 | 3 | 0 | Yes | No |
| 16700049 | DATA PROCESSING SYSTEMS AND METHODS FOR EFFICIENTLY ASSESSING THE RISK OF PRIVACY CAMPAIGNS | December 2019 | April 2020 | Allow | 5 | 1 | 0 | No | No |
| 16687203 | COMMAND INJECTION IDENTIFICATION | November 2019 | March 2022 | Allow | 28 | 1 | 0 | No | No |
| 16683664 | INFORMATION PROCESSING APPARATUS, SYSTEM, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM | November 2019 | March 2022 | Allow | 28 | 2 | 0 | No | No |
| 16673147 | SYSTEMS AND METHODS FOR THE SECURED ENTRY AND STORAGE OF SENSITIVE DATA | November 2019 | July 2020 | Allow | 9 | 1 | 0 | No | No |
| 16566988 | MONITORING PARAMETERS OF CONTROLLERS FOR UNAUTHORIZED MODIFICATION | September 2019 | May 2022 | Allow | 32 | 1 | 0 | Yes | No |
| 16538896 | PREVENTING UNAUTHORIZED ACCESS TO SECURED INFORMATION SYSTEMS BY INJECTING DEVICE DATA COLLECTORS | August 2019 | May 2020 | Allow | 9 | 1 | 0 | No | No |
| 16532330 | Method and system for protecting user privacy | August 2019 | March 2020 | Allow | 7 | 1 | 0 | Yes | No |
| 16429317 | SYSTEMS AND METHODS OF PROVIDING ACCESS TO SECURE DATA | June 2019 | June 2020 | Allow | 12 | 1 | 0 | No | No |
| 16340603 | METHOD FOR ESTABLISHING A CONNECTION OF A MOBILE TERMINAL TO A MOBILE RADIO COMMUNICATION NETWORK AND COMMUNICATION NETWORK DEVICE | April 2019 | November 2022 | Allow | 43 | 4 | 0 | No | No |
| 16374425 | MANAGING IDENTIFIER PRIVACY | April 2019 | December 2019 | Allow | 8 | 1 | 0 | No | No |
| 16351877 | Key-Attestation-Contingent Certificate Issuance | March 2019 | March 2020 | Allow | 12 | 1 | 0 | No | No |
| 16286011 | VEHICLE INTERFACE | February 2019 | July 2020 | Allow | 17 | 2 | 0 | No | No |
| 16325720 | ADAPTER APPARATUS AND PROCESSING METHOD | February 2019 | June 2022 | Abandon | 40 | 1 | 0 | No | No |
| 16273353 | SENTINEL APPLIANCE IN AN INTERNET OF THINGS REALM | February 2019 | April 2020 | Allow | 14 | 1 | 0 | No | No |
| 16267696 | Entity Group Behavior Profiling | February 2019 | July 2020 | Abandon | 18 | 2 | 0 | Yes | No |
| 16247851 | SYSTEM AND METHOD FOR TRANSFERRING STATES BETWEEN ELECTRONIC DEVICES | January 2019 | February 2020 | Allow | 13 | 1 | 0 | No | No |
| 16228166 | SYSTEMS AND METHODS FOR IDENTIFYING PRIVACY LEAKAGE INFORMATION | December 2018 | August 2021 | Allow | 32 | 0 | 0 | No | No |
| 16215530 | Secure Data Transmission Using Natural Language | December 2018 | March 2020 | Allow | 15 | 2 | 0 | No | No |
| 16213683 | UNPREDICTABLE NUMBER GENERATION | December 2018 | July 2020 | Abandon | 19 | 2 | 0 | Yes | No |
| 16213089 | NETWORK SEGMENTATION BY AUTOMATICALLY GENERATED SECURITY GROUPS | December 2018 | September 2021 | Allow | 34 | 2 | 0 | Yes | No |
| 16207817 | METHOD FOR WRITING A SET OF INFORMATION ENCRYPTED IN AN EXTERNAL MEMORY OF AN INTEGRATED CIRCUIT AND CORRESPONDING INTEGRATED CIRCUIT | December 2018 | December 2021 | Abandon | 37 | 1 | 0 | No | No |
| 16208407 | TAMPER-RESISTANT SOFTWARE DEVELOPMENT LIFECYCLE PROVENANCE | December 2018 | September 2021 | Allow | 33 | 1 | 0 | No | No |
| 16207927 | METHOD OF HYBRID SEARCHABLE ENCRYPTION AND SYSTEM USING THE SAME | December 2018 | June 2020 | Allow | 19 | 1 | 0 | No | No |
| 16306707 | TERMINAL DEVICE, KEY DISTRIBUTION MANAGEMENT DEVICE, SERVER-CLIENT SYSTEM, COMMUNICATION METHOD, AND PROGRAMS | December 2018 | July 2022 | Allow | 44 | 3 | 0 | Yes | No |
| 16206721 | ANONYMIZATION OF USER DATA FOR PRIVACY ACROSS DISTRIBUTED COMPUTING SYSTEMS | November 2018 | September 2021 | Allow | 34 | 0 | 1 | No | No |
| 16206733 | NETWORK SECURITY ASSESSMENT USING A NETWORK TRAFFIC PARAMETER | November 2018 | August 2021 | Allow | 32 | 1 | 0 | Yes | No |
| 16202494 | DRM PLUGINS | November 2018 | December 2019 | Allow | 12 | 1 | 0 | No | No |
| 16198838 | METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENT | November 2018 | February 2020 | Allow | 15 | 1 | 0 | No | No |
| 16177394 | User Configurable Alert Notifications Applicable to Search Query Results | October 2018 | April 2020 | Allow | 18 | 1 | 0 | No | No |
| 16166046 | Methods and Apparatus for Using Smart Environment Devices Via Application Program Interfaces | October 2018 | June 2020 | Abandon | 20 | 2 | 0 | Yes | No |
| 16163900 | HYBRID CLOUD IDENTITY MAPPING INFRASTRUCTURE | October 2018 | January 2020 | Allow | 15 | 1 | 0 | No | No |
| 16160913 | ANALYTIC-BASED SECURITY MONITORING SYSTEM AND METHOD | October 2018 | March 2020 | Allow | 17 | 1 | 0 | No | No |
| 16151085 | TECHNIQUES FOR SHARING NETWORK SECURITY EVENT INFORMATION | October 2018 | December 2019 | Allow | 14 | 3 | 0 | Yes | No |
| 16150220 | ALERTING SYSTEMS AND METHODS | October 2018 | April 2021 | Allow | 31 | 0 | 0 | No | No |
| 16149796 | DATA ACCESS AND OWNERSHIP MANAGEMENT | October 2018 | March 2020 | Allow | 18 | 2 | 0 | No | No |
| 16148447 | SYSTEMS AND METHODS FOR SLOGAN BASED SHARING OF LIVING SAAS OBJECTS | October 2018 | September 2021 | Allow | 35 | 1 | 0 | Yes | No |
| 16148375 | SYSTEMS AND METHODS FOR OFFLINE USAGE OF SAAS APPLICATIONS | October 2018 | January 2022 | Allow | 40 | 2 | 1 | Yes | No |
| 16134942 | Programmable Unit for Metadata Processing | September 2018 | May 2020 | Allow | 20 | 1 | 0 | No | No |
| 16127364 | ACCESS TO DATA BROADCAST IN ENCRYPTED FORM BASED ON BLOCKCHAIN | September 2018 | July 2021 | Allow | 34 | 1 | 0 | No | No |
| 16128429 | Wireless Earpieces for Hub Communications | September 2018 | October 2021 | Allow | 38 | 2 | 0 | No | No |
| 16126932 | REAL-TIME DETECTION OF PRIVACY LEAKS BASED ON LINGUISTIC FEATURES | September 2018 | January 2021 | Allow | 28 | 1 | 0 | Yes | No |
| 16121238 | INFORMATION PROCESSING DEVICE AND NON-TRANSITORY COMPUTER READABLE MEDIUM | September 2018 | December 2021 | Abandon | 40 | 4 | 0 | Yes | No |
| 16120708 | DATA SECURITY ACROSS DATA RESIDENCY RESTRICTION BOUNDARIES | September 2018 | January 2021 | Allow | 29 | 1 | 0 | Yes | No |
| 16120489 | FINE-GRAINED ACCESS CONTROL TO DATASETS | September 2018 | June 2021 | Allow | 34 | 3 | 0 | Yes | No |
| 16120812 | SYSTEMS AND METHODS FOR HYBRID BLOCKCHAIN CONTROL | September 2018 | February 2021 | Allow | 29 | 0 | 0 | No | No |
| 16120721 | METHODS AND SYSTEMS OF SECURELY TRANSFERRING DATA | September 2018 | June 2021 | Allow | 33 | 1 | 0 | Yes | No |
| 16059053 | System, Device, and Method of Determining Personal Characteristics of a User | August 2018 | February 2021 | Abandon | 30 | 2 | 0 | No | No |
| 16047016 | STRONG PASSWORD BY CONVENTION METHODS AND SYSTEMS | July 2018 | September 2021 | Abandon | 38 | 2 | 0 | No | No |
| 16046923 | DYNAMIC DISCOVERY RANGE FOR ONLINE SESSIONS | July 2018 | October 2020 | Allow | 27 | 0 | 0 | Yes | No |
| 16072912 | USER INTERFACE ELEMENTS WITH FINGERPRINT VALIDATION | July 2018 | July 2023 | Abandon | 60 | 4 | 0 | Yes | Yes |
| 16072978 | DETECTING MALWARE ON SPDY CONNECTIONS | July 2018 | January 2021 | Allow | 29 | 2 | 0 | Yes | No |
| 16024726 | SYSTEM AND METHOD FOR PERFORMING REMOTE SECURITY ASSESSMENT OF FIREWALLED COMPUTER | June 2018 | January 2020 | Allow | 18 | 1 | 0 | No | No |
| 16013492 | SYSTEMS AND METHODS FOR SECURE DETOKENIZATION | June 2018 | January 2020 | Allow | 19 | 1 | 0 | No | No |
| 16004754 | DATA TRANSFER PREVENTION | June 2018 | October 2020 | Allow | 29 | 2 | 0 | Yes | No |
| 16004947 | IMAGE BASED PASSPHRASE FOR AUTHENTICATION | June 2018 | August 2020 | Allow | 27 | 1 | 0 | Yes | No |
| 16005158 | SYSTEM AND METHOD FOR DETECTING COMPROMISED DATA | June 2018 | July 2020 | Allow | 25 | 1 | 0 | No | No |
| 15993326 | System and Method for Location-Based Access Control | May 2018 | April 2020 | Abandon | 22 | 4 | 0 | Yes | No |
| 15880068 | SYSTEMS AND METHODS FOR AUTHENTICATING PLATFORM TRUST IN A NETWORK FUNCTION VIRTUALIZATION ENVIRONMENT | January 2018 | October 2020 | Allow | 33 | 1 | 0 | Yes | No |
| 15880074 | REINFORCEMENT LEARNING-BASED ENCRYPTION AND DECRYPTION METHOD AND CLIENT AND SERVER SYSTEM PERFORMING THE SAME | January 2018 | March 2020 | Allow | 26 | 1 | 0 | No | No |
| 15829732 | SYSTEMS AND METHODS FOR AIDA BASED EXPLOIT SELECTION | December 2017 | May 2023 | Allow | 60 | 8 | 0 | Yes | Yes |
| 15788570 | Application Graph Builder | October 2017 | January 2021 | Allow | 39 | 3 | 0 | No | No |
| 15672555 | SYSTEM AND METHOD FOR USER IDENTIFICATION AND AUTHENTICATION | August 2017 | February 2020 | Allow | 30 | 2 | 0 | No | No |
| 15639443 | MULTICHANNEL DEVICE UTILIZING A CENTRALIZED OUT-OF-BAND AUTHENTICATION SYSTEM (COBAS) | June 2017 | July 2020 | Abandon | 36 | 4 | 0 | No | No |
| 15385292 | SYSTEM AND METHOD FOR DISTRIBUTED, POLICY-BASED CONFIDENTIALITY MANAGEMENT | December 2016 | November 2019 | Abandon | 34 | 3 | 0 | No | No |
| 15341572 | Control of Internet Browsing in a Secure Environment | November 2016 | February 2020 | Allow | 40 | 2 | 0 | Yes | Yes |
| 15089216 | MULTICHANNEL DEVICE UTILIZING A CENTRALIZED OUT-OF-BAND AUTHENTICATION SYSTEM (COBAS) | April 2016 | July 2020 | Abandon | 51 | 4 | 0 | No | No |
| 14997763 | System and Method for Prediction of Future Threat Actions | January 2016 | February 2020 | Allow | 49 | 4 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner POWERS, WILLIAM S.
With a 33.3% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 28.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner POWERS, WILLIAM S works in Art Unit 2419 and has examined 103 patent applications in our dataset. With an allowance rate of 84.5%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 25 months.
Examiner POWERS, WILLIAM S's allowance rate of 84.5% places them in the 61% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by POWERS, WILLIAM S receive 1.83 office actions before reaching final disposition. This places the examiner in the 39% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by POWERS, WILLIAM S is 25 months. This places the examiner in the 77% percentile for prosecution speed. Applications move through prosecution relatively quickly with this examiner.
Conducting an examiner interview provides a -3.2% benefit to allowance rate for applications examined by POWERS, WILLIAM S. This interview benefit is in the 8% percentile among all examiners. Note: Interviews show limited statistical benefit with this examiner compared to others, though they may still be valuable for clarifying issues.
When applicants file an RCE with this examiner, 25.0% of applications are subsequently allowed. This success rate is in the 41% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.
This examiner enters after-final amendments leading to allowance in 29.7% of cases where such amendments are filed. This entry rate is in the 44% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 7% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 33.3% of appeals filed. This is in the 5% percentile among all examiners. Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.
When applicants file petitions regarding this examiner's actions, 43.5% are granted (fully or in part). This grant rate is in the 34% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.