USPTO Examiner LAKHIA VIRAL S - Art Unit 2431

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19082761NEURAL NETWORK-BASED SECURITY DEFENSE METHOD FOR ENCRYPTED MULTIMEDIA DATA, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCTMarch 2025May 2025Allow200YesNo
18981637SYSTEM AND METHOD FOR DISTRIBUTED EDGE-CLOUD HOMOMORPHIC COMPRESSION USING ADAPTIVE NEURAL NETWORKSDecember 2024March 2025Allow200YesNo
18888656CODEBOOK-BASED HOMOMORPHIC ENCRYPTION FOR EFFICIENT AND PRIVACY-PRESERVING DATA PROCESSINGSeptember 2024February 2026Allow1700YesNo
18828315LANE SCRAMBLING OVER NETWORK COMMUNICATION CHANNELSSeptember 2024December 2025Allow1500YesNo
18811166VERIFIABLE CONSENT FOR PRIVACY PROTECTIONAugust 2024March 2026Allow1900YesNo
18809807ELASTIC SECURITY SERVICES LOAD BALANCING IN A WIRELESS MESH NETWORKAugust 2024January 2026Allow1700YesNo
18839680INFORMATION CONCEALING METHOD, INFORMATION PROCESSING DEVICE, AND INFORMATION PROCESSING SYSTEMAugust 2024February 2026Allow1810NoNo
18799824USER DEVICE CHARACTERIZATION METHOD BASED ON NETWORK DATA TRAFFIC INFORMATION, AND NETWORK ACCESS CONTROL METHOD THEREOFAugust 2024February 2026Allow1800YesNo
18783154CELLULAR IoT SECURITY USING DYNAMIC POLICY-DRIVEN MECHANISMS FOR THREAT MITIGATIONJuly 2024September 2024Allow200YesNo
18772989ON-DEVICE DATA PRIVACY OPERATIONS TO PREVENT DATA SHARING AT USER LOCATIONSJuly 2024February 2026Allow1900YesNo
18755627CODEBOOK-BASED HOMOMORPHIC ENCRYPTION FOR EFFICIENT AND PRIVACY-PRESERVING DATA PROCESSINGJune 2024August 2024Allow200YesNo
18749797FAULT-TO-TIME CONVERTER SENSOR FOR LOW-OVERHEAD FAULT INJECTION ATTACK MITIGATIONJune 2024March 2026Allow2100YesNo
18749054COMMUNICATION CONFIDENTIALITY METHOD FOR APPLICATIONS IN COMMUNICATION CONFIDENTIALITY SYSTEMS AND COMMUNICATION SERVERSJune 2024December 2025Allow1800YesNo
18680722END-TO-END ENCRYPTION WITH DISTRIBUTED KEY MANAGEMENT IN A TRACKING DEVICE ENVIRONMENTMay 2024March 2025Allow1000YesNo
18678004INPUT/OUTPUT INTERFACE SECURITYMay 2024December 2025Allow1810YesNo
18672978INTRUSION DETECTION USING A HEARTBEATMay 2024February 2025Allow900YesNo
18667416SECURE TRAIN COMMUNICATION TECHNIQUESMay 2024February 2026Allow2100YesNo
18664052SAMPLING FROM BINOMIAL DISTRIBUTION IN SECURE MULTI-PARTY COMPUTATIONMay 2024September 2025Allow1600YesNo
18652844SYSTEM, APPARATUS, AND METHOD FOR HARDWARE BASED CRYPTOGRAPHYMay 2024November 2025Allow1800YesNo
18652305SECURITY DESCRIPTION FRAMEWORKMay 2024September 2025Allow1610YesNo
18703394SECURELY EXECUTING ON A PUBLIC COMPUTER CODE THAT OPERATES ON ENCRYPTED DATA BASED ON ONE CONTIGUOUS STAGE OF LINEAR 3-BIT GATES AND A DIFFERENT STAGE OF NON-LINEAR GATESApril 2024October 2025Allow1800NoNo
18637504SECURITY DEVICE AND SUBSTRATEApril 2024October 2025Allow1800YesNo
18630430ALTERNATIVE APPROACH TO THE GENERATION OF A UNIQUE RESPONSE TO A CHALLENGEApril 2024August 2024Allow410NoNo
18629394TOURNAMENT-LEAGUE MECHANISMS FOR COMPARISON BASED COMPUTER OPERATIONSApril 2024September 2025Allow1700YesNo
18628314SYSTEMS AND METHODS FOR SECURITY INTELLIGENCE EXCHANGEApril 2024August 2024Allow400YesNo
18696783ENCRYPTION OF PROGRAM INSTRUCTIONS IN A NUMERICAL CONTROL DEVICEMarch 2024October 2025Allow1900YesNo
18620399AI-GENERATED VIRTUAL FILE HONEYPOTS FOR COMPUTING SYSTEMS BEHAVIOR-BASED PROTECTION AGAINST RANSOMWARE ATTACKSMarch 2024August 2025Allow1600NoNo
18619680SYSTEMS AND METHODS FOR RESTORING SECURE CONNECTIONS BETWEEN DATA PROCESSING SYSTEMS AND CONTROL PLANESMarch 2024August 2025Allow1700YesNo
18612921ADVANCED DEIDENTIFICATION OF INFORMATION, SUCH AS INFORMATION ABOUT A PERSONMarch 2024June 2024Allow300YesNo
18598974SYSTEMS AND METHODS FOR CORRELATING DECRYPTED TLS MESSAGES WITH NETWORK DATA IN REAL TIMEMarch 2024July 2025Allow1700YesNo
18444217SELECTIVE INTELLIGENT OFFLOADING FOR MOBILE NETWORKS OVER DIAMETER AND/OR RADIUS PROTOCOLSFebruary 2024July 2025Allow1700YesNo
18444203SELECTIVE INTELLIGENT ENFORCEMENT FOR MOBILE NETWORKS OVER DIAMETER AND/OR RADIUS PROTOCOLSFebruary 2024August 2025Allow1800YesNo
18441215METHOD FOR CHECKING THE INTEGRITY OF A COMPUTE NODEFebruary 2024November 2025Allow2110NoNo
18440687SYSTEM AND METHOD FOR FRAME PROTECTIONFebruary 2024February 2026Allow2410YesNo
18438481Detection of Security Attacks Through Die-Attach PadFebruary 2024January 2026Allow2310YesNo
18438431Networks Comprising Multi-Quantum Blockchain Systems, Methods, And ProductsFebruary 2024January 2026Abandon2410NoNo
18436176QUANTUM KEY DISTRIBUTIONFebruary 2024July 2025Allow1700YesNo
18421500COMMUNICATION METHOD AND APPARATUSJanuary 2024July 2025Allow1800YesNo
18417002HIGHLY-PARALLEL HARDWARE ARCHITECTURE FOR FULLY HOMOMORPHIC ENCRYPTION (FHE) AND BUTTERFLY-LIKE ALGORITHMSJanuary 2024January 2026Allow2410YesNo
18408390RESTRICTING ACCESS TO APPLICATION PROGRAMMING INTERFACES (APIs)January 2024August 2025Allow1910YesNo
18575055ENFORCEMENT OF ATTESTATION OF READ-ONLY PROTECTED MEMORY DURING ATTESTATION VALIDITY PERIODDecember 2023August 2025Allow2000YesNo
18395400BUSINESS EMAIL COMPROMISE DETECTION SYSTEMDecember 2023June 2025Allow1720YesNo
18539989ELLIPTIC CURVE RANDOM NUMBER GENERATIONDecember 2023February 2025Allow1410NoNo
18538955Method and Device for Spatially Designating Private ContentDecember 2023October 2024Allow1000YesNo
18524650PHYSICAL COMPUTER INTRUSION DETECTIONNovember 2023February 2026Allow2610YesNo
18519076METHOD FOR AUTHENTICATING USER FOR eKYC AUTOMATIONNovember 2023June 2025Allow1800YesNo
18516520HOMOMORPHIC ENCRYPTION FOR WEB APPLICATION FIREWALL PROCESSINGNovember 2023June 2025Allow1900YesNo
18515914METHOD FOR ACCELERATING BOOTSTRAPPING IN A CRYPTOGRAPHIC APPLICATIONNovember 2023August 2025Allow2100YesNo
18506318SYSTEMS AND METHODS OF SECURE PIN CODE ENTRYNovember 2023September 2024Allow1110NoNo
18387261INFORMATION RETRIEVAL METHOD AND APPARATUS, COMPUTER DEVICE, AND STORAGE MEDIUMNovember 2023September 2025Allow2210NoNo
18386005ONBOARDING USING LI-FI FOR DPP BOOTSTRAPPINGNovember 2023January 2026Allow2610YesNo
18385716CLASSICAL COMPUTER, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUMOctober 2023May 2025Allow1900YesNo
18384103METHOD FOR PROVIDING AN ELASTIC CONTENT FILTERING SECURITY SERVICE IN A MESH NETWORKOctober 2023June 2024Allow800YesNo
18491093UNLOCKING METHOD AND ELECTRONIC DEVICEOctober 2023June 2025Allow2000YesNo
18488472METHOD AND APPARATUS FOR SELECTING SELECTIVE SECURITY MODE AND FLOW MANAGEMENT IN A WIRELESS COMMUNICATION SYSTEMOctober 2023November 2025Allow2510NoNo
18487436METHOD, DEVICE, AND SYSTEM FOR PHYSICAL CHANNEL ENCRYPTION IN WIRELESS NETWORKSOctober 2023July 2025Allow2100YesNo
18380023TARGETED AUTHENTICATION QUERIES BASED ON DETECTED USER ACTIONSOctober 2023November 2024Allow1310YesNo
18378583METHOD FOR PROVIDING AN ELASTIC CONTENT FILTERING SECURITY SERVICE IN A MESH NETWORKOctober 2023September 2024Allow1110NoNo
18482819GLOBAL MOBILE COMMUNICATION EVENT IDS FOR IMPROVED NETWORK AND SECURITY OPERATIONSOctober 2023July 2025Allow2100YesNo
18478939DETECTION OF CYBER ATTACKS DRIVEN BY COMPROMISED LARGE LANGUAGE MODEL APPLICATIONSSeptember 2023January 2026Allow2820YesYes
18374044SESSION TRANSFER BETWEEN PRE-REGISTERED SMART GLASSES AND COMPUTER FOR MAINTAINING A CONFIDENTIAL DATA VIEWSeptember 2023June 2025Allow2000YesNo
18367374APPLICATION OF TRAINED ARTIFICIAL INTELLIGENCE PROCESSES TO ENCRYPTED DATA WITHIN A DISTRIBUTED COMPUTING ENVIRONMENTSeptember 2023April 2024Allow700YesNo
18464799CLOUD NATIVE VIRTUAL MACHINE RUNTIME PROTECTIONSeptember 2023October 2024Allow1310NoNo
18463556APPARATUS FOR PRIVACY PRESERVING TEXT SEARCH USING HOMOMORPHIC ENCRYPTION AND METHOD THEREOFSeptember 2023April 2025Allow1900YesNo
18243992SYSTEMS AND METHODS FOR DISTRIBUTED AGENT-BASED MONITORING OF CRYPTOGRAPHIC KEY STORESSeptember 2023May 2025Allow2000YesNo
18462031VERIFIABLE CONSENT FOR PRIVACY PROTECTIONSeptember 2023June 2024Allow910NoNo
18241065SYSTEM FOR SECURELY MONITORING AND EXTRACTING DATA THROUGH A PRIVATE NETWORKAugust 2023February 2025Allow1710NoNo
18547295SECURE DATA COLLECTION VIA A MESSAGING FRAMEWORKAugust 2023March 2026Allow3111YesNo
18234152ELASTIC SECURITY SERVICES LOAD BALANCING IN A WIRELESS MESH NETWORKAugust 2023April 2024Allow800YesNo
18233423Base Station State Detection for Client Computing DevicesAugust 2023January 2026Allow2910NoNo
18449162END-TO-END ENCRYPTION WITH DISTRIBUTED KEY MANAGEMENT IN A TRACKING DEVICE ENVIRONMENTAugust 2023March 2024Allow700YesNo
18358251STORAGE ARRAY PROTECTION USING SIGNED TOKENJuly 2023April 2025Allow2000YesNo
18358690SECURE MULTI-PARTY COMPUTATION METHODS AND APPARATUSES FOR PRIVACY PROTECTION, AND COMPUTER DEVICESJuly 2023May 2025Allow2200YesNo
18224777ELECTRONIC DEVICE FOR DISPLAYING SECURITY IMAGE, AND METHOD FOR OPERATING SAMEJuly 2023January 2026Allow3020YesNo
18225022SELECTIVE INTELLIGENT OFFLOADING FOR MOBILE NETWORKS USING A SECURITY PLATFORMJuly 2023November 2025Allow2810YesNo
18224482PRIVACY MANAGEMENT SYSTEMS AND METHODS FOR USER DEVICESJuly 2023July 2025Allow2410YesNo
18351528CRYPTOGRAPHIC AGILITY FOR PRIVACY-PRESERVING FEDERATED LEARNINGJuly 2023November 2025Abandon2810NoNo
18348687Reinforcement Learning with Information Retrieval FeedbackJuly 2023March 2026Allow3200YesNo
18342867USING REPUTATION TO AVOID FALSE MALWARE DETECTIONSJune 2023April 2024Allow1010NoNo
18215767MANAGING AUTHORIZATION CODES FROM MULTIPLE SOURCESJune 2023November 2025Allow2910NoNo
18343483SYSTEMS AND METHODS FOR PROVISIONING SECURITY POLICIES FOR DERIVING SESSION KEYSJune 2023November 2025Allow2820YesNo
18342500METHOD AND ELECTRONIC DEVICE FOR HANDLING SECURE VIRTUAL EVENT IN VIRTUAL ENVIRONMENTJune 2023October 2025Allow2810NoNo
18213141BYTE N-GRAM EMBEDDING MODELJune 2023May 2024Allow1110NoNo
18334888SAAS SECURITY CONFIGURATIONS DISTRIBUTION AND MANAGEMENTJune 2023July 2025Allow2510YesNo
18256996ORCHESTRATED QUANTUM KEY DISTRIBUTIONJune 2023February 2025Allow2000YesNo
18333484One-Way Communication Data Diode on a ChipJune 2023March 2024Allow910NoNo
18255911QUANTUM KEY TOKENJune 2023March 2025Allow2100YesNo
18205857DCT-BASED WATERMARKING SCHEME FOR DEEP NEURAL NETWORKSJune 2023September 2023Allow400YesNo
18327772Machine Learning-Based Technique for Model ProvenanceJune 2023August 2023Allow300YesNo
18314573LEVEL SENSOR FOR ACTIVATING AND DEACTIVATING A SAFE OPERATING STATEMay 2023December 2025Allow3120YesNo
18140205SECURING ACCESS TO A VIRTUAL MACHINE VIA A SERVICE PROCESSOR USING A KEYApril 2023January 2026Allow3220NoNo
18132247TETRA SYSTEMS AND METHODS FOR CLUSTERING FILES BASED UPON STRUCTUREApril 2023June 2025Allow2610NoNo
18296069DECENTRALIZED SECURE TRUE DIGITAL ID FOR COMMUNICATIONApril 2023March 2025Allow2400YesNo
18194706REAL-TIME ANALYSIS PLUGIN FOR CYBER DEFENSEApril 2023March 2025Allow2300YesNo
18193538UNIFIED IDENTIFICATION VERIFICATION SYSTEMMarch 2023February 2025Allow2200YesNo
17912393System and Method of Creating Symmetric Keys Using Elliptic Curve CryptographyMarch 2023December 2024Allow2700YesNo
18026179INFORMATION PROCESSING DEVICE, CONTROL METHOD, AND PROGRAMMarch 2023April 2025Allow2510YesNo
18179830INTRUSION DETECTION USING A HEARTBEATMarch 2023January 2024Allow1010NoNo
18177145SYSTEMS AND METHODS FOR GENERATING TRUST SCORES AND RELATED RECOMMENDATIONS USING SPDM-ENABLED DEVICESMarch 2023December 2025Allow3320YesNo
18172747ELECTRONIC DEVICE AND MEMORY PROTECTION METHOD USING SAMEFebruary 2023January 2025Allow2300NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LAKHIA, VIRAL S.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
4
Examiner Affirmed
3
(75.0%)
Examiner Reversed
1
(25.0%)
Reversal Percentile
39.1%
Lower than average

What This Means

With a 25.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
33
Allowed After Appeal Filing
19
(57.6%)
Not Allowed After Appeal Filing
14
(42.4%)
Filing Benefit Percentile
87.9%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 57.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner LAKHIA, VIRAL S - Prosecution Strategy Guide

Executive Summary

Examiner LAKHIA, VIRAL S works in Art Unit 2431 and has examined 599 patent applications in our dataset. With an allowance rate of 89.0%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 29 months.

Allowance Patterns

Examiner LAKHIA, VIRAL S's allowance rate of 89.0% places them in the 70% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by LAKHIA, VIRAL S receive 1.76 office actions before reaching final disposition. This places the examiner in the 38% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by LAKHIA, VIRAL S is 29 months. This places the examiner in the 63% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +20.3% benefit to allowance rate for applications examined by LAKHIA, VIRAL S. This interview benefit is in the 64% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 34.2% of applications are subsequently allowed. This success rate is in the 75% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 34.0% of cases where such amendments are filed. This entry rate is in the 51% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 100.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 72% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 87.5% of appeals filed. This is in the 80% percentile among all examiners. Of these withdrawals, 46.4% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.

Petition Practice

When applicants file petitions regarding this examiner's actions, 63.2% are granted (fully or in part). This grant rate is in the 68% percentile among all examiners. Strategic Note: Petitions show above-average success regarding this examiner's actions. Petitionable matters include restriction requirements (MPEP § 1002.02(c)(2)) and various procedural issues.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.5% of allowed cases (in the 60% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • RCEs are effective: This examiner has a high allowance rate after RCE compared to others. If you receive a final rejection and have substantive amendments or arguments, an RCE is likely to be successful.
  • Appeal filing as negotiation tool: This examiner frequently reconsiders rejections during the appeal process. Filing a Notice of Appeal may prompt favorable reconsideration during the mandatory appeal conference.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.