Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18626083 | SYSTEMS AND METHODS FOR ADDRESSING SECURITY-RELATED VULNERABILITIES ARISING IN RELATION TO OFF-BLOCKCHAIN CHANNELS IN THE EVENT OF FAILURES IN A NETWORK | April 2024 | October 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18412798 | SHARING ACCESS TO DATA | January 2024 | December 2024 | Allow | 11 | 2 | 0 | Yes | No |
| 18395825 | IDENTIFYING AND CONSENTING TO PERMISSIONS FOR WORKFLOW AND CODE EXECUTION | December 2023 | November 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18527580 | METHODS FOR VERIFYING VECTOR DATABASE QUERY RESULTS AND DEVICES THEREOF | December 2023 | January 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18509953 | COMMUNICATION SYSTEM AND CONTROL DEVICE | November 2023 | August 2024 | Allow | 9 | 1 | 0 | No | No |
| 18478419 | Mutual Secure Communications | September 2023 | October 2024 | Allow | 13 | 1 | 0 | No | No |
| 18231533 | Sending Verification Password Responsive to Mobile Device Proximity | August 2023 | March 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18213910 | Randomly-Modified First Network to Second Network Communication | June 2023 | July 2024 | Allow | 12 | 1 | 0 | No | No |
| 18198202 | SYSTEMS AND METHODS FOR ADDRESSING SECURITY-RELATED VULNERABILITIES ARISING IN RELATION TO OFF-BLOCKCHAIN CHANNELS IN THE EVENT OF FAILURES IN A NETWORK | May 2023 | January 2024 | Allow | 8 | 0 | 0 | No | No |
| 18306897 | METHODS AND SYSTEMS FOR ACCEPTING DATA FROM USERS BY DISAGGREGATION OF USERS IDENTITY | April 2023 | October 2023 | Allow | 6 | 1 | 0 | No | No |
| 18131145 | SHARING ACCESS TO DATA | April 2023 | October 2023 | Allow | 7 | 0 | 0 | No | No |
| 18041285 | CONTEXTUAL AUTHORISATION | February 2023 | October 2024 | Allow | 20 | 0 | 0 | No | No |
| 18165922 | SYSTEM AND METHOD FOR AUTOMATICALLY SECURING SENSITIVE DATA IN PUBLIC CLOUD USING A SERVERLESS ARCHITECTURE | February 2023 | July 2024 | Allow | 18 | 1 | 1 | No | No |
| 18155330 | SYSTEMS AND METHODS FOR EVENT-BASED APPLICATION CONTROL | January 2023 | March 2024 | Allow | 14 | 1 | 0 | Yes | No |
| 18094097 | SYSTEMS FOR PROVISIONING DEVICES | January 2023 | September 2023 | Allow | 8 | 1 | 0 | Yes | No |
| 18079381 | METHODS FOR VERIFYING DATABASE QUERY RESULTS AND DEVICES THEREOF | December 2022 | August 2023 | Allow | 9 | 1 | 0 | No | No |
| 18047115 | DIFFERENTIAL CLIENT-SIDE ENCRYPTION OF INFORMATION ORIGINATING FROM A CLIENT | October 2022 | June 2024 | Allow | 20 | 2 | 0 | Yes | No |
| 17959322 | METHOD FOR EXCHANGING DATA AND NON-TRANSITORY COMPUTER-READABLE MEDIUM AND SYSTEM THEREOF | October 2022 | September 2024 | Allow | 23 | 0 | 0 | No | No |
| 17958614 | PHYSICAL LAYER ROGUE DEVICE DETECTION | October 2022 | April 2024 | Allow | 18 | 1 | 1 | No | No |
| 17946762 | SECURING DATA DIRECT I/O FOR A SECURE ACCELERATOR INTERFACE | September 2022 | October 2023 | Allow | 13 | 1 | 0 | No | No |
| 17945780 | System of Generating, Inheriting and Destroying Avatar Attribute of Real-Name Identity in Metaverse and Method Thereof | September 2022 | June 2024 | Allow | 21 | 0 | 0 | No | No |
| 17897102 | METHODS FOR VERIFYING DATABASE QUERY RESULTS AND DEVICES THEREOF | August 2022 | October 2022 | Allow | 2 | 0 | 0 | Yes | No |
| 17886983 | Sending Verification Password Responsive to Mobile Device Proximity | August 2022 | June 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 17883162 | Mutual Secure Communications | August 2022 | June 2023 | Allow | 11 | 0 | 0 | No | No |
| 17868711 | TRUST ZONE HOSTED SECURE SCREEN MODE FOR DISCRETIONARY PRESENTATION OF SENSITIVE CORPORATE INFORMATION TO TRUSTED ENDPOINTS | July 2022 | June 2023 | Allow | 11 | 1 | 0 | No | No |
| 17858340 | ELECTRONIC DEVICE FOR SPEECH SECURITY WITH LESS ENVIRONMENTAL SOUND DISTORTION AND OPERATING METHOD THEREOF | July 2022 | January 2024 | Allow | 18 | 1 | 0 | No | No |
| 17808411 | METHODS AND SYSTEMS FOR ENROLLING DEVICE IDENTIFIERS (DEVIDs) ON REDUNDANT HARDWARE | June 2022 | June 2024 | Allow | 24 | 0 | 0 | No | No |
| 17808172 | PROXIMITY-BASED UNLOCKING OF COMMUNAL COMPUTING DEVICES | June 2022 | August 2023 | Allow | 14 | 0 | 1 | No | No |
| 17825215 | IDENTIFYING AND CONSENTING TO PERMISSIONS FOR WORKFLOW AND CODE EXECUTION | May 2022 | October 2023 | Allow | 17 | 1 | 0 | No | No |
| 17824912 | FAULT ATTACK RESISTANT CRYPTOGRAPHIC SYSTEMS AND METHODS | May 2022 | September 2023 | Allow | 16 | 1 | 0 | Yes | No |
| 17824458 | VERIFICATION METHOD AND DEVICE | May 2022 | August 2023 | Allow | 15 | 1 | 0 | No | No |
| 17695175 | EFFICIENT SENSOR DATA DELIVERY | March 2022 | December 2023 | Abandon | 21 | 1 | 0 | No | No |
| 17693301 | Event Based Login And Password History | March 2022 | July 2024 | Allow | 28 | 1 | 0 | No | No |
| 17679524 | ELECTRONIC DEVICE AND METHOD FOR DETERMINING PROVISIONING DEVICE OF EDGE COMPUTING NETWORK | February 2022 | November 2024 | Allow | 33 | 1 | 0 | Yes | No |
| 17571096 | GOVERNED DATABASE CONNECTIVITY (GDBC) THROUGH AND AROUND DATA CATALOG TO REGISTERED DATA SOURCES | January 2022 | April 2024 | Allow | 27 | 0 | 0 | No | No |
| 17645816 | SAFE USE OF LEGACY DIGITAL SIGNATURES IN A POST-QUANTUM WORLD | December 2021 | February 2024 | Allow | 26 | 1 | 0 | No | No |
| 17614438 | METHOD FOR CONFIDENTIALLY PROCESSING DATA OF A VEHICLE | November 2021 | February 2024 | Allow | 27 | 0 | 0 | No | No |
| 17614442 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD | November 2021 | December 2023 | Allow | 25 | 0 | 0 | No | No |
| 17613063 | SYSTEM FOR RESTORING LOST PRIVATE KEY | November 2021 | November 2023 | Allow | 24 | 0 | 0 | No | No |
| 17499923 | Randomly-Modified First Network to Second Network Communication | October 2021 | February 2023 | Allow | 16 | 0 | 0 | No | No |
| 17492656 | Sharing Access To Data | October 2021 | January 2023 | Allow | 16 | 0 | 0 | Yes | No |
| 17492658 | SHARING ACCESS TO DATA | October 2021 | February 2023 | Allow | 16 | 0 | 0 | Yes | No |
| 17600750 | COMMUNICATION SYSTEM AND CONTROL DEVICE | October 2021 | October 2023 | Allow | 24 | 1 | 0 | Yes | No |
| 17491132 | USE OF ASR CONFIDENCE TO IMPROVE RELIABILITY OF AUTOMATIC AUDIO REDACTION | September 2021 | February 2023 | Allow | 16 | 1 | 0 | No | No |
| 17481255 | SHARING ACCESS TO DATA | September 2021 | October 2022 | Allow | 13 | 2 | 0 | Yes | No |
| 17262191 | BATTERY-SWAPPING AND ENCRYPTION SYSTEM AND METHOD FOR ELECTRIC VEHICLE | August 2021 | June 2024 | Allow | 41 | 0 | 0 | No | No |
| 17405838 | TRIGGERING AND CONTROLLING WORKFLOWS ACROSS APPLICATIONS AND SERVICES USED IN CLOUD COMPUTING SYSTEMS | August 2021 | March 2023 | Allow | 19 | 0 | 1 | Yes | No |
| 17429710 | METHOD AND APPARATUS FOR PROTECTING INTEGRITY OF DIGITAL INFORMATION | August 2021 | April 2024 | Allow | 32 | 1 | 0 | No | No |
| 17444287 | DISTRIBUTED SCANNING | August 2021 | July 2024 | Allow | 36 | 1 | 0 | Yes | No |
| 17392433 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | August 2021 | August 2024 | Allow | 36 | 1 | 0 | No | No |
| 17443752 | CYBERSECURITY INCIDENT RESPONSE AND SECURITY OPERATION SYSTEM EMPLOYING PLAYBOOK GENERATION AND PARENT MATCHING THROUGH CUSTOM MACHINE LEARNING | July 2021 | March 2023 | Allow | 19 | 1 | 0 | No | No |
| 17383719 | UTILIZING ENCRYPTED DIGITAL COMMUNICATIONS TO DYNAMICALLY SECURE DIGITAL RIGHTS LICENSING DURING AUTHENTICATION SYSTEM DISRUPTIONS | July 2021 | September 2022 | Allow | 14 | 0 | 0 | No | No |
| 17378271 | METHOD AND APPARATUS FOR APPLYING APPLICATION CONTEXT SECURITY CONTROLS FOR SOFTWARE CONTAINERS | July 2021 | March 2023 | Allow | 20 | 1 | 0 | Yes | No |
| 17361514 | Method for Identification and Authentication of Objects, and System for Implementing the Method | June 2021 | October 2023 | Allow | 28 | 0 | 0 | Yes | No |
| 17342785 | Threat Representation And Automated Tracking and Analysis | June 2021 | April 2024 | Allow | 34 | 1 | 0 | Yes | No |
| 17296949 | COMPUTER IMPLEMENTED SYSTEMS AND METHODS FOR STORING, RETRIEVING AND COMMUNICATION DATA VIA A PEER-TO-PEER NETWORK | May 2021 | September 2024 | Allow | 40 | 2 | 0 | No | No |
| 17303142 | MOBILE LICENSING VERIFICATION INTERMEDIARY | May 2021 | September 2023 | Allow | 28 | 2 | 0 | Yes | No |
| 17204590 | SYSTEM AND METHOD FOR AUTOMATICALLY SECURING SENSITIVE DATA IN PUBLIC CLOUD USING A SERVERLESS ARCHITECTURE | March 2021 | November 2022 | Allow | 20 | 1 | 0 | No | No |
| 17249634 | MULTI-ENVELOPE ENCRYPTION SYSTEM | March 2021 | January 2023 | Allow | 22 | 0 | 0 | Yes | No |
| 17191985 | PRIVACY-PRESERVING ENDORSEMENTS IN BLOCKCHAIN TRANSACTIONS | March 2021 | June 2022 | Allow | 15 | 0 | 0 | No | No |
| 17179646 | METHODS, MEDIA, AND SYSTEMS FOR SCREENING MALICIOUS CONTENT FROM A WEB BROWSER | February 2021 | February 2024 | Allow | 36 | 1 | 0 | Yes | No |
| 17177496 | DATA SECURITY USING REQUEST-SUPPLIED KEYS | February 2021 | June 2024 | Allow | 40 | 3 | 1 | Yes | No |
| 17159216 | Sending Verification Password Responsive to Mobile Device Proximity | January 2021 | July 2022 | Allow | 18 | 0 | 0 | No | No |
| 17149440 | Trust Zone Hosted Secure Screen Mode for Discretionary Presentation of Sensitive Corporate Information to Trusted Endpoints | January 2021 | April 2022 | Allow | 15 | 0 | 0 | No | No |
| 17149088 | USER CONTROLLED TRUSTED & ISOLATED COMPUTING ENVIRONMENTS | January 2021 | March 2022 | Allow | 14 | 0 | 0 | No | No |
| 17146507 | IDENTITY VERIFICATION METHOD AND APPARATUS | January 2021 | July 2021 | Allow | 6 | 1 | 0 | Yes | No |
| 17141897 | ERROR AND ATTACK RESISTANT RANDOM NUMBER GENERATION USING QUANTUM COMPUTING | January 2021 | March 2023 | Allow | 27 | 0 | 0 | No | No |
| 17136044 | DATA PROCESSING DEVICE AND METHOD FOR PROCESSING SECRET DATA | December 2020 | May 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17122378 | SANDBOX ENVIRONMENT FOR DOCUMENT PREVIEW AND ANALYSIS | December 2020 | April 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17107532 | METHODS AND DEVICES FOR AUTHENTICATION | November 2020 | July 2023 | Allow | 32 | 0 | 0 | No | No |
| 17094474 | SYSTEMS AND METHODS FOR CONTROL SYSTEM SECURITY | November 2020 | August 2024 | Allow | 45 | 1 | 1 | Yes | No |
| 17081755 | MEDICAL DEVICE LOCATION AUTHORIZATION | October 2020 | September 2022 | Allow | 23 | 1 | 0 | No | No |
| 17080526 | SECURITY LEVEL-BASED AND TRUST-BASED RECOMMENDATIONS FOR SOFTWARE COMPONENTS | October 2020 | January 2024 | Allow | 39 | 1 | 0 | Yes | No |
| 17036577 | SOFTWARE ACCESS THROUGH HETEROGENEOUS ENCRYPTION | September 2020 | March 2024 | Allow | 42 | 3 | 0 | Yes | No |
| 17022029 | SECURING DATA DIRECT I/O FOR A SECURE ACCELERATOR INTERFACE | September 2020 | June 2022 | Allow | 21 | 0 | 0 | No | No |
| 17014767 | KEY MANAGEMENT DEVICE AND PROCESSOR CHIP HAVING BYPASS CHANNELS | September 2020 | February 2022 | Allow | 17 | 0 | 0 | No | No |
| 16984503 | ELECTRONIC DEVICE FOR SPEECH SECURITY WITH LESS ENVIRONMENTAL SOUND DISTORTION AND OPERATING METHOD THEREOF | August 2020 | April 2022 | Allow | 20 | 0 | 0 | No | No |
| 16964217 | RANKING IDENTITY AND SECURITY POSTURE FOR AUTOMOTIVE DEVICES | July 2020 | January 2021 | Allow | 6 | 0 | 0 | No | No |
| 16962546 | METHOD AND APPARATUS FOR AUTHENTICATION OF RECORDED SOUND AND VIDEO | July 2020 | April 2023 | Abandon | 33 | 2 | 0 | No | No |
| 16960853 | ENABLING AN ENCRYPTED SOFTWARE MODULE IN A CONTAINER FILE | July 2020 | October 2024 | Abandon | 51 | 3 | 0 | No | No |
| 16910722 | TECHNIQUES TO DETECT PERTURBATION ATTACKS WITH AN ACTOR-CRITIC FRAMEWORK | June 2020 | June 2022 | Allow | 24 | 1 | 0 | No | No |
| 16906639 | SECURE FINGERPRINT IMAGE SYSTEM | June 2020 | November 2023 | Allow | 41 | 2 | 1 | Yes | No |
| 16901679 | SYSTEMS AND METHODS FOR EVENT-BASED APPLICATION CONTROL | June 2020 | September 2022 | Allow | 27 | 1 | 0 | No | No |
| 16884526 | IDENTITY VERIFICATION METHOD AND APPARATUS | May 2020 | October 2020 | Allow | 5 | 0 | 0 | Yes | No |
| 16869783 | MESSAGE EMBEDMENT IN RANDOM VALUES | May 2020 | March 2023 | Allow | 34 | 3 | 0 | No | No |
| 16869335 | Cybersecurity Incident Response and Security Operation System Employing Playbook Generation and Parent Matching Through Custom Machine Learning | May 2020 | December 2020 | Allow | 7 | 0 | 1 | Yes | No |
| 16756137 | CRYPTOGRAPHIC DEVICE WITH UPDATABLE SHARED MATRIX | April 2020 | September 2021 | Allow | 17 | 0 | 0 | No | No |
| 16849663 | RIGHTS CONTROLLED COMMUNICATION | April 2020 | March 2023 | Allow | 35 | 1 | 0 | No | No |
| 16847230 | DIFFERENTIAL PRIVACY FOR ENCRYPTED DATA | April 2020 | January 2022 | Allow | 21 | 0 | 0 | No | No |
| 16807728 | DIFFERENTIAL CLIENT-SIDE ENCRYPTION OF INFORMATION ORIGINATING FROM A CLIENT | March 2020 | June 2022 | Allow | 27 | 1 | 0 | Yes | No |
| 16800760 | METHOD FOR STRONGLY ENCRYPTING .ZIP FILES | February 2020 | June 2022 | Allow | 28 | 1 | 0 | No | No |
| 16641569 | Systems And Methods For Record Linkage | February 2020 | October 2022 | Allow | 32 | 1 | 0 | No | No |
| 16789417 | DOCUMENT VERIFICATION | February 2020 | February 2023 | Allow | 36 | 1 | 0 | No | No |
| 16787610 | GRAPHICS PROCESSING UNIT ACCELERATED TRUSTED EXECUTION ENVIRONMENT | February 2020 | December 2021 | Allow | 22 | 0 | 0 | No | No |
| 16776879 | AUTHORIZATION TOKEN INCLUDING FINE GRAIN ENTITLEMENTS | January 2020 | May 2022 | Allow | 27 | 1 | 0 | Yes | No |
| 16774294 | DYNAMIC VISUALIZATION OF SCRIPTS BASED ON CENTRALIZED SECURITY ASSESSMENTS | January 2020 | June 2021 | Allow | 16 | 3 | 0 | Yes | No |
| 16752823 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD | January 2020 | April 2022 | Allow | 26 | 1 | 0 | No | No |
| 16752374 | BINARY SEARCH OF BYTE SEQUENCES USING INVERTED INDICES | January 2020 | December 2022 | Allow | 34 | 1 | 0 | Yes | No |
| 16735240 | LICENSING AUTHENTICATION VIA INTERMEDIARY USING TIME AND PROXIMITY | January 2020 | January 2021 | Allow | 12 | 1 | 0 | No | No |
| 16734500 | Methods For Digitally Signing An Electronic File And Authentication Method | January 2020 | March 2022 | Allow | 26 | 3 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner DINH, MINH.
With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 19.4% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner DINH, MINH works in Art Unit 2432 and has examined 557 patent applications in our dataset. With an allowance rate of 86.2%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 29 months.
Examiner DINH, MINH's allowance rate of 86.2% places them in the 59% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by DINH, MINH receive 1.56 office actions before reaching final disposition. This places the examiner in the 40% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by DINH, MINH is 29 months. This places the examiner in the 46% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +13.9% benefit to allowance rate for applications examined by DINH, MINH. This interview benefit is in the 56% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 32.6% of applications are subsequently allowed. This success rate is in the 62% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 38.3% of cases where such amendments are filed. This entry rate is in the 51% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 20.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 25% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 60.0% of appeals filed. This is in the 30% percentile among all examiners. Of these withdrawals, 26.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 43.6% are granted (fully or in part). This grant rate is in the 47% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 12.0% of allowed cases (in the 97% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 2.5% of allowed cases (in the 68% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.