USPTO Examiner SHAW BRIAN F - Art Unit 2432

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18885585DYNAMIC ENFORCEMENT OF MANAGEMENT RULES ASSOCIATED WITH ARTIFICIAL INTELLIGENCE PIPELINE OBJECT SELECTIONSSeptember 2024December 2024Allow300NoNo
18795244Detecting Security Vulnerabilities Associated with Transient Radio Frequency DevicesAugust 2024January 2025Allow610NoNo
18793122SYSTEMS AND METHODS FOR GENERATING ACCOUNT PERMISSIONS BASED ON APPLICATION PROGRAMMING INTERFACE INTERACTIONSAugust 2024May 2025Allow1020YesNo
18760945METHOD AND SYSTEM OF PROVIDING ACCESS TO DOCUMENTS STORED IN PERSONAL STORAGE MEDIUMSJuly 2024February 2025Allow700YesNo
18743399ITEM TRACKING WITH A WIRELESS COMMUNICATION SYSTEM BASED ON A FIFTH GENERATION IDENTIFIER (5GID) AND A GLOBAL TRACKING ITEM NUMBER (GTIN)June 2024June 2025Allow1200YesNo
18670285RADIO ACCESS NODES AND TERMINAL DEVICES IN A COMMUNICATION NETWORKMay 2024September 2024Allow400NoNo
18645395Context-Based Risk Assessment for an Identity Verification SystemApril 2024February 2025Allow900YesNo
18624818SYSTEMS AND METHODS FOR PROVIDING SECURITY SERVICES DURING POWER MANAGEMENT MODEApril 2024January 2025Allow1000YesNo
18601747QUANTUM KEY DISTRIBUTION FOR SECURE AND PRIVATE TRANSACTIONSMarch 2024February 2025Allow1110YesNo
18435536SYSTEMS AND METHODS TO MAINTAIN USER PRIVACY WHILE PROVIDING RECOMMENDATIONSFebruary 2024February 2025Allow1210YesNo
18412806DETECTION OF VIDEO TAMPERINGJanuary 2024December 2024Allow1110YesNo
18393259ATTACK DETECTION IN ROUND-TRIP TIMING ESTIMATIONDecember 2023June 2025Allow1800NoNo
18515939POST-COMPLETION ACTION MANAGEMENT IN ONLINE DOCUMENT SYSTEMNovember 2023November 2024Allow1210YesNo
18512381COMPUTER SYSTEM AND DEVICE FOR CONTROLLING USE OF SECURE MEDIA RECORDINGSNovember 2023December 2024Allow1310NoNo
18379699SELECTIVE MALWARE SCANNING OF FILES ON VIRTUALIZED SNAPSHOTSOctober 2023May 2025Allow2000YesNo
18376331SYSTEMS AND METHODS FOR PROVIDING SECURITY SERVICES DURING POWER MANAGEMENT MODEOctober 2023November 2023Allow100YesNo
18368734WATERMARKING METHOD FOR SMART CONTRACTSeptember 2023April 2025Allow1900NoNo
18458020Prioritized Virus Scanning of Files Based on File SizeAugust 2023April 2025Allow1900NoNo
18454959SYSTEMS AND METHODS FOR RAPIDLY GENERATING SECURITY RATINGSAugust 2023February 2025Allow1810YesNo
18356004BLOCKCHAIN-BASED SYSTEM AND METHOD FOR PREVENTING UNAUTHORIZED DELETION OF SURVEILLANCE VIDEOJuly 2023April 2025Allow2000NoNo
18343249SYSTEMS AND METHODS FOR GENERATING ACCOUNT PERMISSIONS BASED ON APPLICATION PROGRAMMING INTERFACE INTERACTIONSJune 2023April 2024Allow1010NoNo
18336861AUGMENTED DATA FOR SECURITY DURING RECORD UPDATESJune 2023April 2025Allow2200NoNo
18335470ARTIFICIAL INTELLIGENCE (AI) MODEL TRAINED USING CLUSTERING AND REINFORCEMENT LEARNING FOR DATA DE-IDENTIFICATION ENGINEJune 2023April 2025Allow2200NoNo
18200689Malware Detection Using Document Object Model InspectionMay 2023April 2024Allow1110YesNo
18200548RADIO FREQUENCY THREAT DETECTIONMay 2023June 2024Allow1310NoNo
18138115Detection of User Interface ImitationApril 2023June 2025Allow2600YesNo
18193438Systems And Methods For Protecting Against Relay AttacksMarch 2023November 2023Allow700YesNo
18125463CONSENT-DRIVEN PRIVACY DISCLOSURE CONTROL PROCESSINGMarch 2023March 2024Allow1200YesNo
18163108METHODS AND APPARATUS FOR SECURE CONFIGURATION OF A COMPUTE DEVICEFebruary 2023October 2024Allow2100NoNo
18102530Methods and Systems for Determining the Authenticity of a ComponentJanuary 2023June 2025Allow2900YesNo
18006876DATA MANAGEMENT COMPUTER, DATA MANAGEMENT SYSTEM INCLUDING THE DATA MANAGEMENT COMPUTER, AND METHOD THEREOFJanuary 2023May 2025Allow2800NoNo
18158594SYSTEMS AND METHODS FOR RAPIDLY GENERATING SECURITY RATINGSJanuary 2023June 2023Allow400YesNo
18150354SYSTEMS AND METHODS FOR SERVICE AUTHORIZATION IN A DELEGATED DISCOVERY DEPLOYMENTJanuary 2023January 2025Allow2510YesNo
18063821WIRELESS AUDIO DISTRIBUTION SYSTEMS AND METHODSDecember 2022April 2025Allow2800NoNo
17990102CYBERSECURITY SYSTEM FOR EDGE PROTECTION OF A WIRELESS TELECOMMUNICATIONS NETWORKNovember 2022June 2023Allow700NoNo
17988209RADIO ACCESS NODES AND TERMINAL DEVICES IN A COMMUNICATION NETWORKNovember 2022February 2024Allow1520YesNo
17978274PRIVATE CLOUD INFRASTRUCTURE STITCHING PROCESS AND ORCHESTRATIONNovember 2022December 2024Allow2610YesNo
17978806COMPUTER SYSTEM AND DEVICE FOR CONTROLLING USE OF SECURE MEDIA RECORDINGSNovember 2022July 2023Allow800NoNo
17977147WEB APPLICATION FIREWALL CENTRALIZED MANAGEMENTOctober 2022February 2025Allow2700NoNo
17922280SYSTEMS, METHODS, AND APPARATUS FOR WORKLOAD OPTIMIZED CENTRAL PROCESSING UNITS (CPUS)October 2022February 2025Allow2810YesNo
17976009EXCHANGE ENGINE FOR SECURE ACCESS SERVICE EDGE (SASE) PROVIDER ROAMINGOctober 2022January 2025Allow2700NoNo
18050250Alerting on Anomalous Authorization Requests Derived with Proximity GraphOctober 2022August 2024Allow2200YesNo
17968111VULNERABILITY ANALYSIS FOR SOFTWARE PRODUCTSOctober 2022January 2025Allow2710YesNo
17967669COMPUTER SYSTEM AND DEVICE FOR CONTROLLING USE OF SECURE MEDIA RECORDINGSOctober 2022August 2023Allow1010YesNo
17958569DATA ERASING DEVICE AND DATA ERASING METHODOctober 2022July 2024Allow2100NoNo
17955331SYSTEMS AND METHODS FOR MULTI-ALGORITHM PROCESSING OF DATASETS WITHIN A ZERO-TRUST ENVIRONMENTSeptember 2022August 2024Allow2200NoNo
17946956THROUGHPUT FOR A SINGLE VPN CONNECTION USING MULTIPLE PROCESSING CORESSeptember 2022December 2024Allow2730YesNo
17947066Secure Channel Estimation ArchitectureSeptember 2022July 2024Allow2210YesNo
17816884SYSTEMS AND METHODS FOR APPLYING ATTACK TREE MODELS AND PHYSICS-BASED MODELS FOR DETECTING CYBER-PHYSICAL THREATSAugust 2022June 2024Allow2230YesNo
17870000METHOD, APPARATUS, AND COMPUTER-READABLE RECORDING MEDIUM FOR PERFORMING MACHINE LEARNING-BASED OBSERVATION LEVEL MEASUREMENT USING SERVER SYSTEM LOG AND PERFORMING RISK CALCULATION USING THE SAMEJuly 2022December 2024Allow2910YesNo
17814103AUTOMATICALLY DETECTING MISUSE OF LICENSED SOFTWAREJuly 2022October 2023Allow1520YesNo
17868943SYSTEMS AND METHODS FOR EVALUATING DATA ACCESS SIGNATURE OF THIRD-PARTY APPLICATIONSJuly 2022January 2024Allow1820NoNo
17869192POST-COMPLETION ACTION MANAGEMENT IN ONLINE DOCUMENT SYSTEMJuly 2022January 2023Allow600YesNo
17792292Apparatus and Method for Protecting Shared ObjectsJuly 2022September 2024Allow2600NoNo
17809602SYSTEMS AND METHODS FOR PROTECTING THE SECURITY OF AUTHENTICATION CREDENTIALS UTILIZED TO ACCESS SENSITIVE DATA DURING ONLINE TRANSACTIONSJune 2022May 2024Allow2200NoNo
17738749SECURED AUTOMATIC USER LOG-IN AT WEBSITE VIA PERSONAL ELECTRONIC DEVICEMay 2022June 2024Allow2600YesNo
17738488SESSION ESTABLISHMENT METHOD AND MEANS AND COMMUNICATION SYSTEMMay 2022May 2023Allow1200YesNo
17731045METHOD AND SYSTEM OF PROVIDING ACCESS TO DOCUMENTS STORED IN PERSONAL STORAGE MEDIUMSApril 2022March 2024Allow2300NoNo
17660517CRYPTOGRAPHIC AUTHENTICATION OF A PHYSICAL ASSETApril 2022July 2024Allow2700YesNo
17660437MANAGEMENT CONTROLLER-BASED VERIFICATION OF PLATFORM CERTIFICATESApril 2022October 2024Allow3000YesNo
17715993MANAGING EXCHANGES BETWEEN EDGE GATEWAYS IN A CLOUD ENVIRONMENT TO SUPPORT A PRIVATE NETWORK CONNECTIONApril 2022June 2024Allow2600NoNo
17763705METHOD AND SYSTEM FOR REMOTE VOTER IDENTITY VERIFICATION AND LIVENESS DETECTION IN AN ONLINE VOTING SYSTEMMarch 2022December 2024Allow3210NoNo
17701177SYSTEM INFORMATION ACCESS USING ISOLATED CABLEMarch 2022October 2024Allow3100NoNo
17760783System and Method to enable Shared SaaS Multi-Tenancy using Customer Data Storage, Customer-controlled Data Encryption KeysMarch 2022August 2024Allow2920NoNo
17696153CRYPTOGRAPHIC ENFORCEMENT OF BORROW CHECKINGMarch 2022February 2024Allow2300YesNo
17693550Methods and Systems for Efficient Network ProtectionMarch 2022May 2025Allow3810NoNo
17689385ENHANCED PROCESSING FOR IPSEC STREAMMarch 2022February 2025Allow3510NoNo
17685240COMMUNICATION APPARATUS, CONTROL METHOD, AND STORAGE MEDIUMMarch 2022April 2024Allow2520YesNo
17678560IMPLEMENTING POLICY BASED ON UNIQUE ADDRESSES OR PORTSFebruary 2022April 2024Allow2610YesNo
17677028SYSTEMS AND METHODS FOR SECURE CERTIFICATE MANAGEMENTFebruary 2022June 2023Allow1520YesNo
17665610ASSOCIATIVE HASH TREEFebruary 2022January 2024Allow2300YesNo
17665952ITEM TRACKING WITH A WIRELESS COMMUNICATION SYSTEM BASED ON A FIFTH GENERATION IDENTIFIER (5GID) AND A GLOBAL TRACKING ITEM NUMBER (GTIN)February 2022March 2024Allow2500NoNo
17592316NETWORK ENTITY ID AAAFebruary 2022June 2023Allow1610YesNo
17584523Software security agent updates via microcodeJanuary 2022November 2024Allow3410YesNo
17572644APPARATUS AND METHOD FOR MAINTAINING SECURITY OF VIDEO DATAJanuary 2022December 2023Allow2300YesNo
17572865METHOD AND UNCONSTRAINED UE FOR COMMUNICATION OF CONSTRAINED UE WITH MSGIN5G SERVERJanuary 2022May 2024Allow2800YesNo
17572042BLUETOOTH COMMUNICATION SYSTEM CAPABLE OF INCREASING GENERATION EFFICIENCY OF CYPHER KEYS REQUIRED FOR DATA TRANSMISSION BETWEEN BLUETOOTH HOST DEVICE AND BLUETOOTH DEVICE SET, AND RELATED BLUETOOTH DEVICE SETJanuary 2022January 2024Allow2510NoNo
17572081BLUETOOTH COMMUNICATION SYSTEM CAPABLE OF INCREASING GENERATION EFFICIENCY OF CYPHER KEYS REQUIRED FOR DATA TRANSMISSION BETWEEN BLUETOOTH HOST DEVICE AND BLUETOOTH DEVICE SET, AND RELATED BLUETOOTH DEVICE SETJanuary 2022January 2024Allow2510NoNo
17563572SYSTEM AND METHOD FOR IMPLEMENTING HACKER TRAFFIC BARRIERSDecember 2021April 2023Allow1610YesNo
17622034METHOD AND APPARATUS FOR SUPPORTING UP SECURITY FOR MO-EDT IN CU-DU SPLIT IN A WIRELESS COMMUNICATION SYSTEMDecember 2021July 2024Allow3120NoNo
17549517Secure Channel Estimation ArchitectureDecember 2021July 2024Allow3110YesNo
17542291Context-Based Risk Assessment for an Identity Verification SystemDecember 2021January 2024Allow2600YesNo
17526004RADIO FREQUENCY CAPTURE ANALYSIS REPORTINGNovember 2021April 2024Allow2910NoNo
17518382SELECTING A VPN CONNECTION USING NEGOTIATED CRYPTOGRAPHIC ALGORITHMS TO IMPROVE THROUGHPUTNovember 2021September 2024Allow3420YesYes
17607517NETWORK INFORMATION REPORTING METHOD AND APPARATUS, USER EQUIPMENT, SERVICE NODE AND MEDIUMOctober 2021October 2024Allow3610NoNo
17510380MESSAGE PLATFORM FOR AUTOMATED THREAT SIMULATION, REPORTING, DETECTION, AND REMEDIATIONOctober 2021June 2023Abandon1910YesNo
17490575SYSTEM AND METHOD FOR PROVIDING A SECURE NETWORKSeptember 2021November 2023Allow2600NoNo
17468821SYSTEM FOR LINKING AND PARTITIONING NON-FUNGIBLE TOKENSSeptember 2021November 2023Allow2700YesNo
17462260COMMUNICATION METHOD AND DEVICEAugust 2021January 2024Abandon2810NoNo
17460656Systems And Methods for Providing Network Diversification and Secure CommunicationsAugust 2021February 2024Abandon2920YesNo
17429945DETECTION METHOD, DETECTION SYSTEM, AND DETECTION PROGRAMAugust 2021October 2023Allow2600YesNo
17379495HASH-BASED DYNAMIC RESTRICTION OF CONTENT ON INFORMATION RESOURCESJuly 2021June 2023Allow2320YesNo
17378032METHOD FOR SECURING IMAGE AND ELECTRONIC DEVICE PERFORMING SAMEJuly 2021March 2025Abandon4430NoNo
17361387OAM MEASUREMENT DEVICE INDEPENDENT QUANTUM KEY DISTRIBUTION SYSTEM BASED ON REAL-TIME TRACKING COMPENSATION AND METHOD THEREOFJune 2021November 2024Allow4140YesNo
17304949DYNAMIC VIRTUAL HONEYPOT UTILIZING HONEY TOKENS AND DATA MASKINGJune 2021January 2024Allow3110YesNo
17356141SECURE EXECUTION ENVIRONMENT FOR APPLICATIONS USING BLOCKCHAINJune 2021February 2024Allow3210YesNo
17346130QUANTUM KEY DISTRIBUTION FOR SECURE AND PRIVATE TRANSACTIONSJune 2021November 2023Allow2910YesNo
17241000SYSTEM AND METHOD FOR CONTENT SCANNING USING SPARSE FILESApril 2021August 2023Allow2710NoNo
17238718METHOD AND SYSTEM FOR LIMITING ACCESS OF MULTIPLE DATA NODES TO SHARED STORAGE DURING THE PERFORMANCE OF DATA PROTECTION SERVICES THROUGH LOAD BALANCINGApril 2021September 2023Allow2900NoNo
17222841SYSTEMS AND METHODS FOR PROVIDING SECURITY SERVICES DURING POWER MANAGEMENT MODEApril 2021August 2023Allow2820NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner SHAW, BRIAN F.

Strategic Value of Filing an Appeal

Total Appeal Filings
5
Allowed After Appeal Filing
4
(80.0%)
Not Allowed After Appeal Filing
1
(20.0%)
Filing Benefit Percentile
94.5%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 80.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner SHAW, BRIAN F - Prosecution Strategy Guide

Executive Summary

Examiner SHAW, BRIAN F works in Art Unit 2432 and has examined 137 patent applications in our dataset. With an allowance rate of 96.4%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 27 months.

Allowance Patterns

Examiner SHAW, BRIAN F's allowance rate of 96.4% places them in the 89% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.

Office Action Patterns

On average, applications examined by SHAW, BRIAN F receive 1.40 office actions before reaching final disposition. This places the examiner in the 30% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by SHAW, BRIAN F is 27 months. This places the examiner in the 56% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +0.7% benefit to allowance rate for applications examined by SHAW, BRIAN F. This interview benefit is in the 14% percentile among all examiners. Note: Interviews show limited statistical benefit with this examiner compared to others, though they may still be valuable for clarifying issues.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 27.8% of applications are subsequently allowed. This success rate is in the 39% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 22.6% of cases where such amendments are filed. This entry rate is in the 21% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 100.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 70% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 88% percentile among all examiners. Of these withdrawals, 80.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.

Petition Practice

When applicants file petitions regarding this examiner's actions, 66.7% are granted (fully or in part). This grant rate is in the 83% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.7% of allowed cases (in the 64% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.
  • Appeal filing as negotiation tool: This examiner frequently reconsiders rejections during the appeal process. Filing a Notice of Appeal may prompt favorable reconsideration during the mandatory appeal conference.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.