USPTO Examiner ANDERSON MICHAEL D - Art Unit 2433

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18630413SYSTEMS AND METHODS FOR REQUESTING UNMANNED AERIAL VEHICLE-BASED SURVEILLANCE SERVICESApril 2024June 2025Allow1410YesNo
18408895SYSTEMS AND METHOD FOR SECURE UPDATES OF CONFIGURATION PARAMETERS PROVISIONED IN USER EQUIPMENTJanuary 2024June 2025Allow1710NoNo
18526279TECHNOLOGIES FOR UNTRUSTED CODE EXECUTION WITH PROCESSOR SANDBOX SUPPORTDecember 2023May 2025Allow1820NoNo
18523810COMPUTATIONAL RISK ANALYSIS AND INTERMEDIATIONNovember 2023November 2024Allow1210NoNo
18382442ENDPOINT SECURITY ARCHITECTURE WITH PROGRAMMABLE LOGIC ENGINEOctober 2023October 2024Allow1210NoNo
18287547GALOIS EXTENSION FIELD-BASED BLOCK CIPHEROctober 2023June 2025Allow2000NoNo
18343345SINGLE SIGN-ON ENABLED WITH OAUTH TOKENJune 2023July 2024Allow1310YesNo
18208759INTEGRITY PROTECTION FOR USER PLANE DATA IN 5G NETWORKJune 2023June 2024Allow1310NoNo
18195357System for Quantum Field Noise Source and Secure Information Transfer TherefromMay 2023April 2025Allow2300NoNo
18309871VERIFICATION APPLICATION, METHOD, ELECTRONIC DEVICE AND COMPUTER PROGRAMMay 2023June 2024Abandon1310NoNo
18186835SYSTEMS AND METHODS FOR THE INCREMENTAL AND REVERSIBLE DEPLOYMENT OF A BIOMETRIC IDENTITY MANAGEMENT SYSTEMMarch 2023November 2024Abandon2010NoNo
18092855CREDENTIAL AND AUTHENTICATION MANAGEMENT IN SCALABLE DATA NETWORKSJanuary 2023April 2025Abandon2810NoNo
18066514SYSTEMS AND METHODS FOR VALIDATING AND EXTRACTING DATA DYNAMICALLY FROM IMAGES OF IDENTIFICATION DOCUMENTSDecember 2022April 2025Allow2810YesNo
18076929PRIORITIZED RANKING FOR MEMORY DEVICE PREPARATIONDecember 2022February 2024Allow1510NoNo
17798725DATA PROCESSING DEVICE, DATA PROCESSING METHOD, AND DATA PROCESSING PROGRAMAugust 2022May 2025Abandon3420NoNo
17870395Accelerated Encryption During Power LossJuly 2022December 2024Allow2820YesNo
17866865PROCESS LEVEL AUTHENTICATION FOR CLIENT DEVICE ACCESS TO A SERVER SYSTEMJuly 2022April 2025Allow3320NoNo
17866481SYSTEM AND METHOD FOR SAFELY AUTOFILLING LOGIN FIELDS IN COMPUTING SOURCESJuly 2022March 2025Allow3220YesNo
17810911ROLE-TEMPLATE-BASED BATCH MANAGEMENT OF TENANT-SPECIFIC ROLES AND RIGHTS IN A COMPUTING SYSTEMJuly 2022April 2023Allow910NoNo
17856574FLEXIBLE CONTAINER ATTESTATIONJuly 2022June 2023Allow1110NoNo
17825184METHOD FOR GENERATING AND AUTHENTICATING THREE-DIMENSIONAL DYNAMIC OTP WITHOUT PASSWORD INPUTMay 2022November 2024Allow3010NoNo
17662481DELETING STALE OR UNUSED KEYS TO GUARANTEE ZERO PACKET LOSSMay 2022September 2024Allow2810YesNo
17729416Systems and Methods for Hybrid Physical Unclonable FunctionsApril 2022August 2024Allow2720NoNo
17729586SYSTEMS AND METHODS FOR FACILITATING SECURE AUTHENTICATION WHEN CONDUCTING BLOCKCHAIN OPERATIONS USING CRYPTOGRAPHY-BASED, STORAGE APPLICATIONSApril 2022November 2024Allow3110YesNo
17659360COMPUTING SYSTEM PROVIDING SAAS APPLICATION ACCESS WITH DIFFERENT CAPABILITIES BASED UPON USER PERSONASApril 2022July 2023Abandon1510NoNo
17762085INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, PROGRAM, AND USER INTERFACEMarch 2022September 2024Allow3010YesNo
17761861METHOD AND DEVICE FOR DETECTING SECURITY BASED ON MACHINE LEARNING IN COMBINATION WITH RULE MATCHINGMarch 2022September 2024Allow3010NoNo
17684949SINGLE SIGN-ON ENABLED OAUTH TOKENMarch 2022May 2023Allow1410NoNo
17665319String Sanitizer ModelingFebruary 2022August 2024Allow3010NoNo
17586127BROWSER INTEGRATION WITH CRYPTOGRAMJanuary 2022June 2024Allow2940YesNo
17646485Rootkit detection based on system dump files analysisDecember 2021July 2024Allow3010YesNo
17564286INFORMATION SECURITY PROTECTION SYSTEM AND INFORMATION SECURITY PROTECTION METHODDecember 2021April 2024Allow2820NoNo
17562952MULTIFACTOR AUTHENTICATION THROUGH CRYPTOGRAPHY-ENABLED SMART CARDSDecember 2021September 2024Allow3220YesNo
17622635METHODS AND DEVICES FOR SECURING A MULTIPLE-ACCESS PERIPHERAL NETWORKDecember 2021April 2025Allow4030YesNo
17558389Hardware-Based Obfuscation of Digital DataDecember 2021April 2024Allow2820YesNo
17457934DETECTING SECURITY ATTACKS USING WORKSPACE ORCHESTRATION LOGSDecember 2021February 2025Allow3830NoNo
17544419AUTHENTICATION APPARATUS AND METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUMDecember 2021June 2024Abandon3010NoNo
17540455INTEGRITY PROTECTION FOR USER PLANE DATA IN 5G NETWORKDecember 2021March 2023Allow1510NoNo
17456770SYSTEM AND METHOD FOR MAINTAINING TENANT DATA ISOLATION IN A MESSAGING SERVICENovember 2021August 2024Allow3320NoNo
17533999SYSTEMS AND METHODS FOR REQUESTING UNMANNED AERIAL VEHICLE-BASED SURVEILLANCE SERVICESNovember 2021January 2024Allow2520YesNo
17453223ENFORCING EULA VERSION AWARE APPLICATION RESPONSENovember 2021May 2024Allow3140NoYes
17512691INFORMATION PROCESSING APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUM STORING INFORMATION PROCESSING PROGRAM, AND INFORMATION PROCESSING METHODOctober 2021March 2025Abandon4110NoNo
17606335TRUSTED SOLUTIONS FOR ENABLING USER EQUIPMENT BELONGING TO A HOME NETWORK TO ACCESS DATA COMMUNICATION SERVICES IN A VISITED NETWORKOctober 2021December 2023Allow2610NoNo
17503639DATA STORAGE DEVICE, SYSTEM, AND METHOD FOR DIGITAL SIGNATUREOctober 2021April 2024Allow2910NoNo
17491555APPARATUSES AND METHODS FOR ALLOCATING INPUTS AND OUTPUTS IN RESPECT OF INTERFACES OF DEVICESOctober 2021February 2024Allow2810NoNo
17600456GENERATING UNIQUE CRYPTOGRAPHIC KEYS FROM A POOL OF RANDOM ELEMENTSSeptember 2021January 2024Allow2810NoNo
17485999SECURE IDENTIFICATION OF WAFER AND CHIPSeptember 2021January 2024Allow2820NoYes
17598189FUNCTIONS WITH A PRE-CHARGE OPERATION AND AN EVALUATION OPERATIONSeptember 2021February 2024Allow2920NoNo
17478789Secure Analytics Using Term Generation and Homomorphic EncryptionSeptember 2021June 2023Allow2110NoNo
17437695WIRELESS DEVICE AND NETWORK NODE FOR VERIFICATION OF A DEVICE AS WELL AS CORRESPONDING METHODS IN A WIRELESS COMMUNICATION SYSTEMSeptember 2021October 2024Allow3730NoNo
17447170SECURING POLAR CODESSeptember 2021July 2024Abandon3430NoNo
17435924NETWORK PROTECTIONSeptember 2021May 2024Abandon3310NoNo
17462585Method and Apparatus for Evaluating Phishing Sites to Determine Their Level of Danger and Profile Phisher BehaviorAugust 2021September 2023Abandon2510NoNo
17431713COMMUNICATION TERMINAL DEVICE, COMMUNICATION CONTROL METHOD, AND COMMUNICATION CONTROL PROGRAMAugust 2021March 2025Allow4340NoNo
17432078SECURE PASSWORD ENTRY METHOD AND SYSTEMAugust 2021October 2024Allow3820NoNo
17367106TECHNOLOGIES FOR UNTRUSTED CODE EXECUTION WITH PROCESSOR SANDBOX SUPPORTJuly 2021August 2023Allow2520NoNo
17349278IDENTIFYING AN ACTIVE ADMINISTRATION FUNCTION (ADMF) IN A LAWFUL INTERCEPTION DEPLOYMENT THAT UTILIZES A PLURALITY OF ADMFSJune 2021June 2023Allow2410YesNo
17340188SYSTEMS AND METHODS FOR PROTECTION AGAINST THEFT OF USER CREDENTIALSJune 2021April 2023Allow2310YesNo
17311334SECURE CONSENSUS OVER A LIMITED CONNECTIONJune 2021April 2024Allow3510NoNo
17337678COMPUTATIONAL RISK ANALYSIS AND INTERMEDIATIONJune 2021August 2023Allow2720NoNo
17317156SYSTEMS, METHODS, AND STORAGE MEDIA FOR ASSESSMENT AND DISCOVERY OF IDENTITY RESOURCES IN AN IDENTITY INFRASTRUCTUREMay 2021February 2025Allow4540YesNo
17285779COMMUNICATION DEVICE, COMMUNICATION METHOD, AND DATA STRUCTUREApril 2021March 2024Allow3510NoNo
17229608SELF-SYNCHRONIZING MODE OF OPERATION FOR AN ENCRYPTION/DECRYPTION ALGORITHMApril 2021August 2023Allow2820NoNo
17201117SECURE DATA MANAGEMENT IN A NETWORK COMPUTING ENVIRONMENTMarch 2021January 2024Allow3440YesNo
17200437Web Endpoint Device Having Automatic Switching Between Proxied and Non-Proxied Communication ModesMarch 2021August 2023Allow2920NoNo
17192249GRAPH-BASED SOURCE CODE VULNERABILITY DETECTION SYSTEMMarch 2021April 2024Abandon3710NoNo
17192000INTEGRITY FOR MOBILE NETWORK DATA STORAGEMarch 2021March 2024Allow3630NoNo
17165901REMOTE ACCESS SERVICE INSPECTORFebruary 2021October 2022Allow2010NoNo
17050398DECENTRALIZED DATA VERIFICATIONJanuary 2021April 2024Allow4110NoNo
17147370IDENTITY AUTHENTICATION METHOD, PERSONAL SECURITY KERNEL NODE, DEVICE, AND MEDIUMJanuary 2021August 2024Allow4330NoNo
17138814APPARATUS AND METHOD FOR MULTI-LINK MANAGEMENT IN MULTI-LINK COMMUNICATION SYSTEMSDecember 2020April 2023Allow2720YesNo
17136518SYSTEMS AND METHODS FOR PROTECTION AGAINST THEFT OF USER CREDENTIALSDecember 2020February 2024Allow3830YesNo
17128078System & Method for Implementing User WatermarksDecember 2020April 2023Allow2820NoNo
17124816CONTEXT-BASED SIMULATION OF CONTENTDecember 2020April 2024Allow4050YesNo
17252721SYSTEMS AND METHOD FOR SECURE UPDATES OF CONFIGURATION PARAMETERS PROVISIONED IN USER EQUIPMENTDecember 2020October 2023Allow3410NoNo
17109097GRADUAL PASSWORD ROLLOVERDecember 2020October 2022Allow2210YesNo
17108612Method and Apparatus for Network Fraud Detection and Remediation Through AnalyticsDecember 2020October 2023Allow3430NoNo
17090759Remote Monitoring and Assessment of Operating System ParametersNovember 2020November 2022Allow2410YesNo
17069047TECHNIQUES TO GENERATE WIRELESS LOCAL AREA ACCESS NETWORK FAST TRANSITION KEY MATERIAL BASED ON AUTHENTICATION TO A PRIVATE WIRELESS WIDE AREA ACCESS NETWORKOctober 2020May 2023Allow3120YesNo
17033678FIRST PROCESSING APPARATUS TO BE CONNECTED TO A SECOND PROCESSING APPARATUS, AND NON-TRANSITORY COMPUTER READABLE MEDIUMSeptember 2020December 2023Abandon3940YesNo
17020486MULTI-TENANT CRYPTOGRAPHIC MEMORY ISOLATIONSeptember 2020February 2023Allow2920NoNo
17007324APPARATUS AND METHODS FOR RESTRICTED BINDING OF PORTSAugust 2020April 2024Allow4340YesNo
17006154AUTOMATING DIGITAL FORENSIC EVIDENCE COLLECTIONAugust 2020March 2023Allow3120NoNo
16947857ASYMMETRIC KEY EXCHANGE BETWEEN USER EQUIPMENT USING SIPAugust 2020May 2023Allow3330NoNo
16969363INTEGRITY PROTECTION FOR USER PLANE DATA IN 5G NETWORKAugust 2020December 2022Abandon2820NoNo
16992052SYSTEMS AND METHODS FOR AUTHENTICATING TIME-SENSITIVE NETWORK ELEMENTSAugust 2020August 2023Allow3630YesNo
16936482METHOD AND SYSTEM FOR OPTIMIZING ACCESS TO DATA NODES OF A DATA CLUSTER USING A DATA ACCESS GATEWAY AND METADATA MAPPING BASED BIDDINGJuly 2020October 2023Allow3830NoNo
16936531METHOD AND SYSTEM FOR OPTIMIZING ACCESS TO DATA NODES OF A DATA CLUSTER USING A DATA ACCESS GATEWAY AND BIDDING COUNTERSJuly 2020January 2024Allow4230NoNo
16936469METHOD AND SYSTEM FOR OPTIMIZING ACCESS TO DATA NODES OF A DATA CLUSTER USING A DATA ACCESS GATEWAY AND METADATA MAPPING BASED BIDDING IN AN ACCELERATOR POOLJuly 2020June 2023Allow3520NoNo
16923253INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHODJuly 2020June 2024Allow4750YesNo
16919181Phishing Detection based on Interaction with End UserJuly 2020July 2023Abandon3730NoNo
16916303MODULATION-AGNOSTIC TRANSFORMATIONS USING UNITARY BRAID DIVISIONAL MULTIPLEXING (UBDM)June 2020December 2022Allow3010YesNo
16764954SYSTEM AND METHOD FOR PERFORMING BUILDING-WIDE WIRELESS NETWORK INTRUSION DETECTION VIA CONNECTED LUMINAIRESMay 2020October 2022Abandon2910NoNo
16808731GENERATING URLs TO DETECT AUTONOMOUS PROGRAMS SYSTEMS AND METHODSMarch 2020September 2023Allow4330YesNo
16644375METHOD AND APPARATUS FOR AUTHENTICATING TERMINAL AND NETWORK IN 5G COMMUNICATION SYSTEMMarch 2020January 2023Allow3420NoNo
16732888Method for Sharing and Searching PlaylistsJanuary 2020March 2023Allow3820NoNo
16704350DATA PROTECTION WITHIN AN UNSECURED STORAGE ENVIRONMENTDecember 2019May 2022Allow3010NoNo
16610632First Network Node, Second Network Node, Wireless Device and Methods Therein for Handling Broadcast InformationNovember 2019September 2022Allow3510NoNo
16653885SYSTEM AND METHOD FOR SECURE COMMUNICATIONSOctober 2019September 2022Allow3510NoNo
16600270SYSTEMS AND METHODS FOR THE INCREMENTAL AND REVERSIBLE DEPLOYMENT OF A BIOMETRIC IDENTITY MANAGEMENT SYSTEMOctober 2019November 2022Allow3710NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner ANDERSON, MICHAEL D.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
26
Examiner Affirmed
10
(38.5%)
Examiner Reversed
16
(61.5%)
Reversal Percentile
84.1%
Higher than average

What This Means

With a 61.5% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.

Strategic Value of Filing an Appeal

Total Appeal Filings
75
Allowed After Appeal Filing
33
(44.0%)
Not Allowed After Appeal Filing
42
(56.0%)
Filing Benefit Percentile
70.2%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 44.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner ANDERSON, MICHAEL D - Prosecution Strategy Guide

Executive Summary

Examiner ANDERSON, MICHAEL D works in Art Unit 2433 and has examined 640 patent applications in our dataset. With an allowance rate of 82.7%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 34 months.

Allowance Patterns

Examiner ANDERSON, MICHAEL D's allowance rate of 82.7% places them in the 49% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.

Office Action Patterns

On average, applications examined by ANDERSON, MICHAEL D receive 2.39 office actions before reaching final disposition. This places the examiner in the 82% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by ANDERSON, MICHAEL D is 34 months. This places the examiner in the 23% percentile for prosecution speed. Applications take longer to reach final disposition with this examiner compared to most others.

Interview Effectiveness

Conducting an examiner interview provides a +12.9% benefit to allowance rate for applications examined by ANDERSON, MICHAEL D. This interview benefit is in the 54% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 29.7% of applications are subsequently allowed. This success rate is in the 48% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 31.2% of cases where such amendments are filed. This entry rate is in the 37% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 72.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 57% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 68.3% of appeals filed. This is in the 48% percentile among all examiners. Of these withdrawals, 42.9% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 74.5% are granted (fully or in part). This grant rate is in the 89% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.6% of allowed cases (in the 62% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Expect multiple rounds of prosecution: This examiner issues more office actions than average. Address potential issues proactively in your initial response and consider requesting an interview early in prosecution.
  • Plan for extended prosecution: Applications take longer than average with this examiner. Factor this into your continuation strategy and client communications.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.