USPTO Examiner POPHAM JEFFREY D - Art Unit 2432

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18907977METHODS FOR VERIFYING DATABASE QUERY RESULTS AND DEVICES THEREOFOctober 2024December 2024Allow210YesNo
18387414SECURE DIGITAL ASSET LEASING SYSTEMNovember 2023February 2025Abandon1630YesNo
18208702AUTHENTICATION SYSTEM FOR PROVIDING BIOMETRICS-BASED LOGIN SERVICEJune 2023June 2025Abandon2510NoNo
18133892SYSTEM AND METHODS FOR AUTHENTICATING TANGIBLE PRODUCTSApril 2023January 2024Allow911YesNo
17992022Identity And Access Management Using A Decentralized Gateway Computing SystemNovember 2022May 2025Allow3020YesNo
17938381DETECTION OF A REWIND ATTACK AGAINST A SECURE ENCLAVEOctober 2022April 2024Abandon1910NoNo
17932833SERIALIZATION OF FIREWALL RULES WITH USER, DEVICE, AND APPLICATION CORRELATIONSeptember 2022February 2025Abandon2920YesNo
17940802SECURE CONNECTIONS ESTABLISHMENTSeptember 2022October 2024Abandon2520NoNo
17844218SYSTEM AND METHODS FOR AUTHENTICATING TANGIBLE PRODUCTSJune 2022April 2025Abandon3410NoNo
17734936SYSTEM AND METHOD FOR FILE AND FILE SYSTEM INTEGRITY USING DIRECTORIESMay 2022January 2025Abandon3210NoNo
17734942SYSTEM AND METHOD FOR VERIFYING A SECURED FILE, DIRECTORY OR META-DATAMay 2022February 2025Abandon3310NoNo
17717210METHOD AND SYSTEM FOR PROVIDING LIMITED DISTRIBUTION OF A DIGITAL MEDIA FILEApril 2022May 2025Abandon3820NoNo
17563535Methods, Systems, and Computer Readable Media for Adaptive Packet FilteringDecember 2021October 2024Abandon3320NoNo
17450982PROTECTION DEVICE AND DONGLE AND METHOD FOR USING THE SAMEOctober 2021July 2024Abandon3310NoNo
17490711COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR APPLICATION IDENTIFICATION AND AUTHENTICATIONSeptember 2021June 2024Abandon3360NoNo
17490288COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR APPLICATION IDENTIFICATION AND AUTHENTICATIONSeptember 2021June 2024Abandon3340YesYes
17393314AUTHENTICATION SYSTEM FOR PROVIDING BIOMETRICS-BASED LOGIN SERVICEAugust 2021November 2023Abandon2721YesNo
17362913BLOCKCHAIN DATA PROCESSING METHODS AND APPARATUSES BASED ON CLOUD COMPUTINGJune 2021July 2022Allow1330YesNo
17341166LOGIN TO A SUSPENDED ACCOUNTJune 2021August 2022Abandon1520YesNo
17283156SYSTEM AND METHODS FOR AUTHENTICATING TANGIBLE PRODUCTSApril 2021March 2022Allow1120YesNo
17187425TIME-BASED DEGRADATION OF DIGITAL CREDENTIALS IN A DIGITAL CREDENTIAL PLATFORMFebruary 2021October 2024Abandon4320NoNo
17155089AUTOMATED AUTHENTICATION AND AUTHORIZATION IN A COMMUNICATION SYSTEMJanuary 2021March 2023Allow2641YesNo
17133276METHOD FOR MANAGING NETWORK DEVICES, APPARATUS, AND COMPUTER READABLE STORAGE MEDIUMDecember 2020February 2024Abandon3801NoNo
17130180DETECTING SUSPICIOUS ACTIVATION OF AN APPLICATION IN A COMPUTER DEVICEDecember 2020April 2025Allow5251YesNo
17255087Methods for Delivering an Authenticatable Management Activity to Remote DevicesDecember 2020March 2023Abandon2610NoNo
17121867MICRO-SEGMENTATION OF VIRTUAL COMPUTING ELEMENTSDecember 2020March 2023Allow2720YesYes
17107584MANAGING COMMUNICATIONS AMONG CONSENSUS NODES AND CLIENT NODESNovember 2020April 2021Allow510YesNo
17052038PRIVACY CONTROLS FOR NETWORK DATA COMMUNICATIONSOctober 2020January 2024Abandon3910NoNo
17065212DOUBLY LINKED BLOCKCHAINOctober 2020April 2024Allow4230YesNo
16948925TRUSTED EXECUTION ENVIRONMENT (TEE) DETECTION OF SYSTEMIC MALWARE IN A COMPUTING SYSTEM THAT HOSTS THE TEEOctober 2020November 2023Abandon3730NoNo
17044299METHOD AND SYSTEM FOR HANDWRITTEN SIGNATURE VERIFICATIONSeptember 2020October 2023Allow3700NoNo
17037105DYNAMIC OPTIMIZATION OF CLIENT APPLICATION ACCESS VIA A SECURE ACCESS SERVICE EDGE (SASE) NETWORK OPTIMIZATION CONTROLLER (NOC)September 2020June 2024Abandon4530YesNo
17032780SECURE AUTHENTICATION METHOD FOR PERFORMING A HOST OPERATION USING A DELEGATED AUTHORIZATION MECHANISMSeptember 2020March 2025Abandon5440YesNo
17032592PROTECTING SENSITIVE DATA IN DOCUMENTSSeptember 2020June 2025Allow5740YesNo
16942023Determining Authenticity of Reported User Action in Cybersecurity Risk AssessmentJuly 2020April 2024Allow4520YesNo
16919998DEVICE-SPECIFIC AUTHENTICATION CREDENTIALSJuly 2020January 2023Abandon3120NoNo
16914148PERSONAL INFORMATION VAULTJune 2020December 2024Abandon5440YesNo
16908150SYSTEM FOR ISOLATED ACCESS AND ANALYSIS OF SUSPICIOUS CODE IN A DISPOSABLE COMPUTING ENVIRONMENT USING A USER INTERFACE AND AN AUTOMATED INTELLIGENT SYSTEMJune 2020September 2023Abandon3930NoNo
16768820COMMUNICATION DEVICE, DATA STRUCTURE, COMMUNICATION METHOD, AND COMPUTER PROGRAMJune 2020October 2022Abandon2910NoNo
16874189APPARATUSES AND METHODS FOR IMPROVED DATA PRIVACYMay 2020October 2024Abandon5340YesNo
16847749DETECTION OF A REWIND ATTACK AGAINST A SECURE ENCLAVEApril 2020January 2024Abandon4511YesNo
16832437Parameter Protection Method And Device, And SystemMarch 2020June 2025Abandon6060YesNo
16828216SYSTEMS AND METHODS FOR EFFICIENT COMPUTATIONS ON SPLIT DATA AND SPLIT ALGORITHMSMarch 2020February 2024Allow4780NoNo
16803407DECENTRALIZED AUTHENTICATION ANCHORED BY DECENTRALIZED IDENTIFIERSFebruary 2020September 2023Abandon4330YesNo
16793461SYSTEM AND METHOD FOR IDENTIFYING SYSTEM FILES TO BE CHECKED FOR MALWARE USING A REMOTE SERVICEFebruary 2020November 2023Abandon4460NoNo
16716595SYSTEMS AND METHODS FOR CONTINUOUS USER AUTHENTICATIONDecember 2019December 2022Allow3620NoNo
16680873GENERATING HIGHLY REALISTIC DECOY EMAIL AND DOCUMENTSNovember 2019November 2020Abandon1210NoNo
16612115METHOD FOR HANDWRITTEN ELECTRONIC SIGNATURENovember 2019December 2020Abandon1410NoNo
16673121ENDPOINT SECURITY ARCHITECTURE WITH PROGRAMMABLE LOGIC ENGINENovember 2019January 2023Abandon3820NoYes
16579310CENTRALIZED CAPABILITY SYSTEM FOR PROGRAMMABLE SWITCHESSeptember 2019March 2025Abandon6060YesYes
16570365SERIALIZATION OF FIREWALL RULES WITH USER, DEVICE, AND APPLICATION CORRELATIONSeptember 2019June 2022Allow3310YesNo
16567781NETWORK AUTHENTICATION FOR REAL-TIME INTERACTION USING PRE-AUTHORIZED DATA RECORDSeptember 2019January 2022Abandon2830NoNo
16544694SYSTEM AND METHOD FOR AUTOMATIC DIGITAL COPY FOR PHYSICAL MEDIA PURCHASEAugust 2019August 2024Allow6040YesYes
16486445METHOD AND SYSTEM FOR PROVIDING LIMITED DISTRIBUTION OF A DIGITAL MEDIA FILEAugust 2019March 2022Allow3130YesNo
16524387Using Assured Calling Sequences in Micro-SandboxesJuly 2019February 2021Abandon1930NoNo
16479611REQUEST CONTROL DEVICE, REQUEST CONTROL METHOD, AND REQUEST CONTROL PROGRAMJuly 2019February 2023Allow4230YesNo
16517290SYSTEMS AND METHODS FOR USING AUTOMATED BROWSING TO RECOVER SECURED KEY FROM A SINGLE DATA ENTRYJuly 2019April 2021Abandon2120YesNo
16515800COMMUNICATING CONTENT OVER A COMMUNICATIONS NETWORKJuly 2019December 2021Abandon2910NoNo
16434585AERONAUTICAL CYBERSECURITYJune 2019March 2024Abandon5740YesNo
16419017Securing Authentication ProcessesMay 2019November 2024Abandon6021YesYes
16417698BLOCKCHAIN-ANCHORED SMART DOCUMENTSMay 2019July 2020Abandon1411YesNo
16415360METHOD AND SYSTEM FOR ACCESS TOKEN PROCESSINGMay 2019April 2024Allow5941YesNo
16411588METHOD AND SYSTEM FOR VERIFICATION OF DELETED DATA FOR BLOCKCHAINSMay 2019November 2024Abandon60100YesYes
16410866DATA PROCESSING SYSTEMS FOR FULFILLING DATA SUBJECT ACCESS REQUESTS AND RELATED METHODSMay 2019April 2021Abandon2321NoNo
16403574CLIENT-SITE DOM API ACCESS CONTROLMay 2019June 2023Abandon4960YesYes
16401223HARDWARE INTRUSION DETECTION SYSTEMMay 2019October 2021Allow3010YesNo
16398194System, Method and Apparatus for Increasing Website Relevance While Protecting PrivacyApril 2019April 2021Allow2400NoNo
16390464MANAGING COMMUNICATIONS AMONG CONSENSUS NODES AND CLIENT NODESApril 2019August 2020Allow1630YesNo
16377463Adjusting Biometric Detection Thresholds Based on Recorded BehaviorApril 2019November 2023Allow5531YesNo
16356987SYSTEM AND METHOD FOR PRE-AUTHENTICATION OF CUSTOMER SUPPORT CALLSMarch 2019March 2021Allow2430YesNo
16266467DETERMINING AUTHENTICITY OF REPORTED USER ACTION IN CYBERSECURITY RISK ASSESSMENTFebruary 2019April 2020Allow1520YesNo
16172667Universal Authentication and Data Exchange Method, System and ServiceOctober 2018December 2020Abandon2520YesNo
16165877GENERATION AND MAINTENANCE OF IDENTITY PROFILES FOR IMPLEMENTATION OF SECURITY RESPONSEOctober 2018March 2025Abandon6061NoNo
16162099IMPERSONATION FOR A FEDERATED USEROctober 2018August 2022Allow4620YesNo
16157782Gesture Based Authentication for Payment in Virtual RealityOctober 2018October 2022Abandon4840NoYes
16152132TECHNIQUES FOR CREDENTIAL GENERATIONOctober 2018September 2024Abandon6070NoYes
16149236TRUSTED ACCOUNT REVOCATION IN FEDERATED IDENTITY MANAGEMENTOctober 2018May 2022Allow4340YesNo
16129409SYSTEM AND METHODOLOGY FOR SELECTIVE APPLICATION PERMISSIONINGSeptember 2018June 2021Abandon3350YesNo
16112083CONTROLLING CONTENT AND CONTENT SOURCES ACCORDING TO SITUATIONAL CONTEXTAugust 2018January 2022Abandon4140NoNo
16066315DARK WEB MONITORING, ANALYSIS AND ALERT SYSTEM AND METHODJune 2018September 2022Allow5140YesNo
16019575METHODS AND APPARATUS TO ASSIGN SECURITY IN NETWORKED COMPUTING ENVIRONMENTSJune 2018December 2024Abandon6050YesNo
16063556METHOD FOR AUTHENTICATION VIA A COMBINATION OF BIOMETRIC PARAMETERSJune 2018September 2020Abandon2710NoNo
16063265DEVICE FOR SELF-DEFENSE SECURITY BASED ON SYSTEM ENVIRONMENT AND USER BEHAVIOR ANALYSIS, AND OPERATING METHOD THEREFORJune 2018June 2022Abandon4850NoNo
15993553TIME-BASED DEGRADATION OF DIGITAL CREDENTIALS IN A DIGITAL CREDENTIAL PLATFORMMay 2018May 2024Abandon6030NoNo
15985605PROXY MANAGER USING REPLICA AUTHENTICATION INFORMATIONMay 2018March 2025Abandon6050YesNo
15963760Automated Security Risk Assessment Systems and MethodsApril 2018April 2022Allow4850NoNo
15952095NETWORK AUTHENTICATION FOR REAL-TIME INTERACTION USING PRE-AUTHORIZED DATA RECORDApril 2018December 2021Abandon4440NoNo
15937831MULTIPLEXING SECURITY TUNNELSMarch 2018May 2022Abandon5040YesNo
15928705COMPUTER IMPLEMENTED METHOD FOR AUTOMATICALLY CERTIFYING DOCUMENTS WITH INTEGRITY AND AUTHENTICITY GUARANTEES AND COMPUTER PROGRAMS THEREOFMarch 2018May 2021Allow3830YesNo
15913329SYSTEM AND METHOD FOR AIRCRAFT DATA LOADING USING CABIN GATEWAYSMarch 2018June 2023Abandon6020NoYes
15881377ASSEMBLY AND METHOD FOR ACCESSING SECURE NETWORKS USING OPTICALLY-SENSED INFORMATIONJanuary 2018March 2022Abandon5020NoNo
15853199SYSTEMS AND METHODS IMPLEMENTING COUNTERMEASURES TO PHASE TRACKING ATTACKS ON RING OSCILLATOR BASED ENTROPY SOURCESDecember 2017January 2023Allow6040YesYes
15851986METHOD FOR THE SECURITY OF AN ELECTRONIC OPERATION WITH A CHIP CARDDecember 2017August 2021Allow4430YesNo
15852793SERVER, CAMERA AND METHODDecember 2017December 2020Abandon3620NoNo
15851648DATA NETWORK PATH INTEGRITY VERIFICATIONDecember 2017March 2022Abandon5130YesNo
15849889METHOD FOR ACCELERATING EXECUTION OF APPLICATION IN A TRUSTED EXECUTION ENVIRONMENTDecember 2017May 2022Allow5330YesNo
15850901Cyber Threat Intelligence System InfrastructureDecember 2017September 2023Allow6080NoNo
15850502ELASTIC TIMESTAMPINGDecember 2017March 2021Abandon3920NoNo
15847373SECURE VEHICLE CONTROL UNIT UPDATEDecember 2017July 2021Allow4330YesNo
15846911TENANT MANAGEMENT METHOD AND SYSTEM IN A CLOUD COMPUTING ENVIRONMENTDecember 2017October 2022Abandon5840YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner POPHAM, JEFFREY D.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
30
Examiner Affirmed
23
(76.7%)
Examiner Reversed
7
(23.3%)
Reversal Percentile
35.8%
Lower than average

What This Means

With a 23.3% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
42
Allowed After Appeal Filing
9
(21.4%)
Not Allowed After Appeal Filing
33
(78.6%)
Filing Benefit Percentile
25.1%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 21.4% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner POPHAM, JEFFREY D - Prosecution Strategy Guide

Executive Summary

Examiner POPHAM, JEFFREY D works in Art Unit 2432 and has examined 168 patent applications in our dataset. With an allowance rate of 35.1%, this examiner allows applications at a lower rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 45 months.

Allowance Patterns

Examiner POPHAM, JEFFREY D's allowance rate of 35.1% places them in the 3% percentile among all USPTO examiners. This examiner is less likely to allow applications than most examiners at the USPTO.

Office Action Patterns

On average, applications examined by POPHAM, JEFFREY D receive 3.85 office actions before reaching final disposition. This places the examiner in the 100% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by POPHAM, JEFFREY D is 45 months. This places the examiner in the 2% percentile for prosecution speed. Applications take longer to reach final disposition with this examiner compared to most others.

Interview Effectiveness

Conducting an examiner interview provides a +26.7% benefit to allowance rate for applications examined by POPHAM, JEFFREY D. This interview benefit is in the 77% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 9.6% of applications are subsequently allowed. This success rate is in the 2% percentile among all examiners. Strategic Insight: RCEs show lower effectiveness with this examiner compared to others. Consider whether a continuation application might be more strategic, especially if you need to add new matter or significantly broaden claims.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 4.3% of cases where such amendments are filed. This entry rate is in the 2% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 57.1% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 46% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 36.2% of appeals filed. This is in the 3% percentile among all examiners. Of these withdrawals, 23.5% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.

Petition Practice

When applicants file petitions regarding this examiner's actions, 47.6% are granted (fully or in part). This grant rate is in the 55% percentile among all examiners. Strategic Note: Petitions show above-average success regarding this examiner's actions. Petitionable matters include restriction requirements (MPEP § 1002.02(c)(2)) and various procedural issues.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 12% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 3.4% of allowed cases (in the 73% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Prepare for rigorous examination: With a below-average allowance rate, ensure your application has strong written description and enablement support. Consider filing a continuation if you need to add new matter.
  • Expect multiple rounds of prosecution: This examiner issues more office actions than average. Address potential issues proactively in your initial response and consider requesting an interview early in prosecution.
  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.
  • Plan for extended prosecution: Applications take longer than average with this examiner. Factor this into your continuation strategy and client communications.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.