USPTO Examiner PYZOCHA MICHAEL J - Art Unit 2419

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
17129882PLATFORM AND METHOD OF CERTIFICATION OF AN ELECTRONIC NOTICE FOR ELECTRONIC IDENTIFICATION AND TRUST SERVICES (EIDAS)December 2020March 2023Allow2720NoNo
17123273AUTOMATED VIEWPOINT DETECTION AND SCREEN OBFUSCATION OF SECURE CONTENTDecember 2020August 2023Allow3221YesNo
17083785DATA PROVISIONING DEVICE FOR PROVISIONING A DATA PROCESSING ENTITYOctober 2020February 2023Allow2710NoNo
17080740Selective Deep Inspection in Security Enforcement by a Network Security System (NSS)October 2020August 2023Allow3330YesNo
16948996EXTERNAL SECURE AND ENCRYPTED SSD DEVICE AND A SECURE OPERATING SYSTEM ON AN EXTERNAL SSD DEVICEOctober 2020September 2022Abandon2410NoNo
17065324SYSTEM AND METHOD FOR IDENTIFYING UNPERMITTED DATA IN SOURCE CODEOctober 2020December 2022Allow2600NoNo
17034150CONTROLLED DEPLOYMENT OF BLENDED HONEYPOT SERVICESSeptember 2020March 2023Allow2920NoNo
17026380METHOD AND SYSTEM FOR BIOMETRIC VERIFICATIONSeptember 2020July 2022Allow2200NoNo
16981253Detecting Injection Vulnerabilities of Client-Side Templating SystemsSeptember 2020December 2022Allow2710YesNo
17008786Fractal File Encryption Engine and Method ThereofSeptember 2020June 2023Abandon3420NoNo
16985578EXTENSIBLE, SECURE AND EFFICIENT MONITORING AND DIAGNOSTIC PIPELINE FOR HYBRID CLOUD ARCHITECTUREAugust 2020October 2021Allow1410NoNo
16936646SYSTEMS AND METHODS FOR DATA MASKING AND AGGREGATION USING ONE-TIME PADSJuly 2020March 2023Abandon3220YesNo
16931053SYSTEMS AND METHODS FOR SENDING AND RECEIVING ENCRYPTED SUBMESSAGESJuly 2020August 2022Allow2520YesNo
16961839IN-VEHICLE-FUNCTION ACCESS CONTROL SYSTEM, IN-VEHICLE APPARATUS, AND IN-VEHICLE-FUNCTION ACCESS CONTROL METHODJuly 2020March 2023Abandon3220NoNo
16919785DIGITAL IDENTITY NETWORK INTERFACE SYSTEMJuly 2020December 2022Allow2930NoNo
16954061METHOD AND APPARATUS FOR COMPUTING HASH FUNCTIONJune 2020August 2022Allow2610NoNo
16895608DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEMJune 2020January 2021Allow800NoNo
16892424Rule Swapping in a Packet NetworkJune 2020May 2022Allow2310NoNo
16892162KEY UPDATE DEVICE AND STORAGE MEDIUM STORING KEY UPDATE PROGRAMJune 2020August 2022Abandon2710NoNo
16882041System and Method for Managing the Multi-factor Authentication Data of a UserMay 2020June 2022Allow2420YesNo
16879222SCRUBBER FOR DISTRIBUTED DENIAL OF SERVICE ATTACKS TARGETTING MOBILE NETWORKSMay 2020August 2022Allow2710YesNo
16878347ANOMALY ALERT SYSTEM FOR CYBER THREAT DETECTIONMay 2020May 2022Allow2410NoNo
16862250OPTIMAL SCANNING PARAMETERS COMPUTATION METHODS, DEVICES AND SYSTEMS FOR MALICIOUS URL DETECTIONApril 2020December 2021Allow1910NoNo
16614535METHOD FOR SECURING COMMUNICATION WITHOUT MANAGEMENT OF STATESApril 2020February 2022Allow2710NoNo
16857390Domain Pass-Through Authentication In A Hybrid Cloud EnvironmentApril 2020August 2021Allow1620NoNo
16855262TERMINAL DEVICE PERFORMING HOMOMORPHIC ENCRYPTION, SERVER DEVICE PROCESSING CIPHERTEXT AND METHODS THEREOFApril 2020June 2021Allow1420NoNo
16847031SECURITY TECHNIQUES FOR 5G AND NEXT GENERATION RADIO ACCESS NETWORKSApril 2020October 2022Allow3010YesNo
16842306COMPACT KEY WITH REUSABLE COMMON KEY FOR ENCRYPTIONApril 2020December 2022Allow3220YesNo
16834961Graphic Pattern-Based Authentication with Adjustable Challenge LevelMarch 2020July 2022Allow2710NoNo
16832488Latency Sensitive Tactile Network Security InterfacesMarch 2020October 2020Allow700NoNo
16828629SYSTEM, METHOD, AND COMPUTER PROGRAM FOR DETECTION OF ANOMALOUS USER NETWORK ACTIVITY BASED ON MULTIPLE DATA SOURCESMarch 2020October 2020Allow710NoNo
16826493MULTI-CLOUD BI-DIRECTIONAL STORAGE REPLICATION SYSTEM AND TECHNIQUESMarch 2020March 2021Allow1210NoNo
16825456AUTHORIZING COMMUNICATIONS BETWEEN COMPUTING NODESMarch 2020September 2021Allow1820NoNo
16646815SYSTEM AND METHOD FOR ANALYZING INTERNET TRAFFIC TO DETECT DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKMarch 2020May 2024Abandon5040NoNo
16802006MULTI-FACTOR MESSAGE-BASED AUTHENTICATION FOR NETWORK RESOURCESFebruary 2020May 2022Allow2710YesNo
16802326SYSTEMS AND METHODS FOR REDUCING THE NUMBER OF OPEN PORTS ON A HOST COMPUTERFebruary 2020September 2023Allow4250NoNo
16796060AUTHENTICATION FOR NEXT GENERATION SYSTEMSFebruary 2020September 2020Allow700NoNo
16794746CONFIGURABLE LATTICE CRYPTOGRAPHY PROCESSOR FOR THE QUANTUM-SECURE INTERNET OF THINGS AND RELATED TECHNIQUESFebruary 2020March 2022Allow2520YesNo
16790222SECURE DEBUG ARCHITECTUREFebruary 2020May 2022Allow2730YesNo
16773044TERMINAL DEVICE PERFORMING HOMOMORPHIC ENCRYPTION, SERVER DEVICE PROCESSING CIPHERTEXT AND METHODS THEREOFJanuary 2020April 2021Allow1510NoNo
16750821SERVER BASED METHODS AND SYSTEMS FOR CONDUCTING PERSONALIZED, INTERACTIVE AND INTELLIGENT SEARCHESJanuary 2020November 2020Allow1010YesNo
16749817ACCESS CONTROL USING PROOF-OF-POSSESSION TOKENJanuary 2020April 2022Allow2720NoNo
16744341RULE SWAPPING IN A PACKET NETWORKJanuary 2020April 2020Allow300NoNo
16734984Handling Encoded InformationJanuary 2020June 2021Allow1710NoNo
16730741SYSTEMS AND METHODS FOR SUBSCRIBER CERTIFICATE PROVISIONINGDecember 2019October 2021Allow2210NoNo
16730551Advanced Asset Tracking and CorrelationDecember 2019December 2020Allow1110NoNo
16725757METHODS AND APPARATUS TO FACILITATE MALWARE DETECTION USING COMPRESSED DATADecember 2019August 2022Allow3230YesNo
16724105MICROPROCESSOR PIPELINE CIRCUITRY TO SUPPORT CRYPTOGRAPHIC COMPUTINGDecember 2019November 2021Allow2310NoNo
16717441METADATA TRANSCODINGDecember 2019March 2021Allow1510NoNo
16702058Systems and Methods for In-Session Refresh of Entitlements Associated with Web ApplicationsDecember 2019December 2020Allow1210NoNo
16697772HARDWARE SECURITY MODULE, AND TRUSTED HARDWARE NETWORK INTERCONNECTION DEVICE AND RESOURCESNovember 2019February 2022Allow2710NoNo
16694361SECURE COMPUTING DEVICENovember 2019May 2023Allow4240YesNo
16612357SECURE TELECOMMUNICATIONS AND TRANSACTIONAL PLATFORMNovember 2019October 2022Abandon3620NoNo
16673079DNS-BASED CAPTIVE PORTAL WITH INTEGRATED TRANSPARENT PROXY TO PROTECT AGAINST USER DEVICE CACHING INCORRECT IP ADDRESSNovember 2019February 2021Allow1610NoNo
16668043METHOD FOR DETECTING COMPUTER VIRUS, COMPUTING DEVICE, AND STORAGE MEDIUMOctober 2019October 2021Allow2410NoNo
16661909PERSONATED REALITY ECOSYSTEMOctober 2019March 2020Allow410NoNo
16599677AUTOMATIC MASKING OF SENSITIVE DATAOctober 2019March 2021Allow1720NoNo
16595342DATA PROCESSING SYSTEMS FOR GENERATING AND POPULATING A DATA INVENTORYOctober 2019November 2020Allow1330YesNo
16603283DISPLAYING A BIOS UPDATE PROGRESSOctober 2019June 2022Allow3210NoNo
16591578SYSTEMS AND METHODS FOR SELECTING AND UTILIZING A COMMITTEE OF VALIDATOR NODES IN A DISTRIBUTED SYSTEMOctober 2019November 2021Abandon2510NoNo
16590731Wearable Device Cloud AuthenticationOctober 2019March 2022Abandon2910NoNo
16589232METHOD AND SYSTEM FOR DETECTING AN ATTACK ON A PHYSICALLY UNCLONABLE FUNCTION (PUF)October 2019August 2021Allow2320YesNo
16580015SYSTEM AND METHOD OF DETECTING MALICIOUS FILES BASED ON FILE FRAGMENTSSeptember 2019May 2022Allow3230NoNo
16578741TARGETED VERY LONG DELAY FOR INCREASING SPECULATIVE EXECUTION PROGRESSIONSeptember 2019July 2022Allow3410YesNo
16575790SYSTEM AND METHOD FOR PRIVACY PRESERVATION IN CYBER THREATSeptember 2019February 2023Allow4110NoNo
16568131CONCURRENT ENABLEMENT OF ENCRYPTION ON AN OPERATIONAL PATH AT A HOST PORTSeptember 2019September 2021Allow2410YesNo
16568124CONCURRENT ENABLEMENT OF ENCRYPTION ON AN OPERATIONAL PATH AT A STORAGE PORTSeptember 2019September 2021Allow2410YesNo
16563737SECURITY METHOD FOR VEHICLE NETWORK, FIREWALL FOR THE SAME, AND COMPUTER-READABLE RECORDING MEDIUM RECORDING THE SAMESeptember 2019January 2022Abandon2810NoNo
16556594Method Of Enrolling A Device Into A PKI Domain For Certificate Management Using Factory Key ProvisioningAugust 2019July 2021Allow2320NoNo
16553318INTEGRATED CIRCUIT FOR SECURITY OF A PHYSICALLY UNCLONABLE FUNCTION AND A DEVICE INCLUDING THE SAMEAugust 2019April 2022Allow3110NoNo
16486898ANONYMOUS ATTESTATIONAugust 2019February 2022Allow3020NoNo
16525207METHOD AND SYSTEM FOR DYNAMIC TESTING WITH DIAGNOSTIC ASSESSMENT OF SOFTWARE SECURITY VULNERABILITYJuly 2019August 2022Allow3640NoNo
16478596TERMINAL DEVICE PERFORMING HOMOMORPHIC ENCRYPTION, SERVER DEVICE PROCESSING CIPHERTEXT AND METHODS THEREOFJuly 2019May 2020Allow1010NoNo
16504735SYSTEM AND METHOD FOR ACCESS CONTROL VIA MOBILE DEVICEJuly 2019February 2021Allow1910NoNo
16503596Filtering Personally Identifiable Information From Vehicle DataJuly 2019March 2022Allow3230NoNo
16458678METHOD AND APPARATUS FOR ENCRYPTING AND DECRYPTING DATA ON AN INTEGRATED CIRCUITJuly 2019April 2022Allow3420NoNo
16469646Method and Device for Starting Application Based on Fingerprint RecognitionJune 2019February 2022Allow3240NoYes
16466749HUMAN CAPITAL MANAGEMENT DATA TRANSFER SYSTEMSJune 2019July 2021Allow2520NoNo
16464286METHOD TO CREATE A TRUSTED POOL OF DEVICESMay 2019July 2021Allow2610NoNo
16410859PROTECTING COMPUTER SYSTEMS USING MERKLE TREES AS PROOF-OF-WORKMay 2019March 2020Allow1010NoNo
16408425MULTI-CLOUD BI-DIRECTIONAL STORAGE REPLICATION SYSTEM AND TECHNIQUESMay 2019February 2020Allow1000YesNo
16402403System and Method for Supporting Multiple Identities for a Secure Identity DeviceMay 2019September 2022Allow4020NoYes
16399291METHODS AND SYSTEMS FOR PREVENTING UTILIZATION OF PROBLEMATIC SOFTWAREApril 2019November 2022Allow4220NoNo
16393870Encryption Card, Electronic Device, and Encryption Service MethodApril 2019February 2022Abandon3320YesNo
16343066Protecting User's Anonymity when Visiting Foreign NetworksApril 2019November 2021Allow3120YesYes
16386014MITIGATING COMMUNICATION AND CONTROL ATTEMPTSApril 2019April 2020Allow1220YesNo
16384543Attack Kill Chain Generation and Utilization for Threat AnalysisApril 2019January 2022Allow3320NoNo
16384807PRIVILEGED ACCOUNT BREACH DETECTIONS BASED ON BEHAVIORAL ACCESS PATTERNSApril 2019December 2021Allow3330YesNo
16384560ASSET REMEDIATION TREND MAP GENERATION AND UTILIZATION FOR THREAT MITIGATIONApril 2019January 2022Allow3320NoNo
16378865Information SecurityApril 2019July 2022Allow3930YesNo
16378961AUTOMATION SYSTEM, SERIES TERMINAL FOR AUTOMATION SYSTEMS AND ASSOCIATED METHODApril 2019October 2020Allow1800NoNo
16379108SYSTEM AND METHOD FOR IMPLEMENTING A LOG SOURCE VALUE TOOL FOR SECURITY INFORMATION EVENT MANAGEMENTApril 2019June 2021Allow2720NoNo
16379028STATISTICAL AUTOMATIC DETECTION OF MALICIOUS PACKETS IN DDOS ATTACKS USING AN ENCODING SCHEME ASSOCIATED WITH PAYLOAD CONTENTApril 2019October 2020Allow1900NoNo
16378599Affectedness scoring engine for cyber threat intelligence servicesApril 2019September 2021Allow2930NoNo
16368537OPTIMAL SCANNING PARAMETERS COMPUTATION METHODS, DEVICES AND SYSTEMS FOR MALICIOUS URL DETECTIONMarch 2019April 2020Allow1220NoNo
16336953SECURE COMPUTATION SYSTEM, SECURE COMPUTATION APPARATUS, SECURE COMPUTATION METHOD, AND SECURE COMPUTATION PROGRAMMarch 2019April 2021Allow2400NoNo
16363211VERIFYING IDENTITY OF A VEHICLE ENTERING A TRUST ZONEMarch 2019September 2021Allow3020NoNo
16362218COMPOSABLE TRUSTWORTHY EXECUTION ENVIRONMENTSMarch 2019February 2021Allow2300NoNo
16332652DEVICE AND METHOD FOR VERIFYING APPLICATIONMarch 2019November 2021Allow3220NoNo
16273947LOCATION-BASED, CONTEXT-AWARE CHALLENGE-RESPONSE AUTHENTICATIONFebruary 2019September 2021Allow3120YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner PYZOCHA, MICHAEL J.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
1
Examiner Affirmed
0
(0.0%)
Examiner Reversed
1
(100.0%)
Reversal Percentile
93.3%
Higher than average

What This Means

With a 100.0% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.

Strategic Value of Filing an Appeal

Total Appeal Filings
6
Allowed After Appeal Filing
3
(50.0%)
Not Allowed After Appeal Filing
3
(50.0%)
Filing Benefit Percentile
78.5%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 50.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner PYZOCHA, MICHAEL J - Prosecution Strategy Guide

Executive Summary

Examiner PYZOCHA, MICHAEL J works in Art Unit 2419 and has examined 167 patent applications in our dataset. With an allowance rate of 91.0%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 27 months.

Allowance Patterns

Examiner PYZOCHA, MICHAEL J's allowance rate of 91.0% places them in the 76% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.

Office Action Patterns

On average, applications examined by PYZOCHA, MICHAEL J receive 1.74 office actions before reaching final disposition. This places the examiner in the 34% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by PYZOCHA, MICHAEL J is 27 months. This places the examiner in the 70% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +7.5% benefit to allowance rate for applications examined by PYZOCHA, MICHAEL J. This interview benefit is in the 37% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 37.0% of applications are subsequently allowed. This success rate is in the 84% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 52.6% of cases where such amendments are filed. This entry rate is in the 79% percentile among all examiners. Strategic Recommendation: This examiner is highly receptive to after-final amendments compared to other examiners. Per MPEP § 714.12, after-final amendments may be entered "under justifiable circumstances." Consider filing after-final amendments with a clear showing of allowability rather than immediately filing an RCE, as this examiner frequently enters such amendments.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 150.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 90% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 80.0% of appeals filed. This is in the 72% percentile among all examiners. Of these withdrawals, 75.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.

Petition Practice

When applicants file petitions regarding this examiner's actions, 26.1% are granted (fully or in part). This grant rate is in the 13% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Consider after-final amendments: This examiner frequently enters after-final amendments. If you can clearly overcome rejections with claim amendments, file an after-final amendment before resorting to an RCE.
  • RCEs are effective: This examiner has a high allowance rate after RCE compared to others. If you receive a final rejection and have substantive amendments or arguments, an RCE is likely to be successful.
  • Request pre-appeal conferences: PACs are highly effective with this examiner. Before filing a full appeal brief, request a PAC to potentially resolve issues without full PTAB review.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.