USPTO Examiner GOODCHILD WILLIAM J - Art Unit 2433

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18793542SECURING AN INTERCONNECTED DIGITAL ENGINEERING AND CERTIFICATION ECOSYSTEMAugust 2024January 2025Allow510YesNo
18781088PROBE-BASED VIRTUAL NETWORK SENSITIVE DATA TRAFFIC DETECTIONJuly 2024January 2026Allow1740YesNo
18763433APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING A SET OF MESSAGES OF INTEREST IN A NETWORKJuly 2024August 2025Allow1410NoNo
18725997A HARDWARE ARCHITECTURE CONFIGURED TO IMPLIMENT ASCON CRYPTOGRAPHIC ALGORITHMS AND PROTECT AGAINST SIDE-CHANNEL ATTACKSJuly 2024November 2024Allow510NoNo
18726038QUANTUM-SECURE DIGITAL CURRENCYJuly 2024February 2026Allow1901NoNo
18751929METHOD AND SYSTEM FOR RE-ENCRYPTION OF ENCRYPTED DATA BY GENERATING RE-ENCRYPTION KEYJune 2024October 2025Allow1600NoNo
18677203DEVICE FOR PROTECTING CONTENT BY USING BIOMETRIC INFORMATION AND OPERATING METHOD THEREOFMay 2024March 2026Allow2110YesNo
18674292Device Administration with Public Key InfrastructureMay 2024March 2026Allow2110YesNo
18651467ZERO KNOWLEDGE PROOF OF DEEP NEURAL NETWORK OWNERSHIPApril 2024October 2025Allow1700NoNo
18649598SYSTEM AND METHOD FOR VALIDATING A RESPONSE BASED ON CONTEXT INFORMATIONApril 2024February 2025Allow910NoNo
18643389FAVORITE MERCHANTS SELECTION IN TRANSACTION BASED AUTHENTICATIONApril 2024February 2025Allow1010NoNo
18633010SYSTEM AND METHOD FOR APPROXIMATE HOMOMORPHIC RING ENCRYPTIONApril 2024October 2025Allow1800NoNo
18626431DETECTING MODEL INVERSION ATTACKS IN FEDERATED LEARNINGApril 2024December 2025Allow2010YesNo
18696959REPLICATED SECRET SHARE GENERATION FOR DISTRIBUTED SYMMETRIC CRYPTOGRAPHYMarch 2024August 2025Allow1700NoNo
18599872BIG DATA ANALYSIS DEVICE FOR PREVENTING PERSONAL INFORMATION INFRINGEMENT, METHOD FOR OPERATING SAME, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUMMarch 2024November 2025Allow2010YesNo
18594146INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY STORAGE MEDIUM FOR EXCHANGING AND COMPARING AN ENCRYPTED KEY, ENCRYPTED DATA, AND A HASH VALUE OF THE ENCRYPTED DATA VIA A DISTRIBUTED LEDGER PLATFORMMarch 2024January 2026Allow2310NoNo
18594773USER AUTHENTICATED ENCRYPTED COMMUNICATION LINKMarch 2024January 2026Allow2320NoNo
18589047SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY COMMUNICATIONS CHANNELSFebruary 2024April 2025Abandon1310NoNo
18582670DYNAMICALLY TRACEABLE PRIVACY-PRESERVING DISTRIBUTED THRESHOLD SIGNATURE SYSTEM AND METHODFebruary 2024November 2025Allow2100NoNo
18438620QUORUM-BASED SECURE AUTHENTICATIONFebruary 2024February 2025Allow1210NoNo
18427376Systems and Methods for Addressing Inconsistencies in Attack PathsJanuary 2024January 2026Allow2310YesNo
18292382METHOD FOR VERIFYING DIGITAL SIGNATURES, VEHICLE COMPUTING UNIT AND VEHICLEJanuary 2024December 2025Allow2310NoNo
18420551PROTECTING TIMING SYNCHRONIZATION FUNCTION VALUES WITH SECURITY PARAMETERSJanuary 2024January 2026Allow2420NoNo
18416593DETERMINING SECURITY RISKS ASSOCIATED WITH AN ACCESS DESIGN BASED ON ACCESS HEALTH SCORESJanuary 2024November 2025Allow2200YesNo
18579314Encryption Key for Inter-Network CommunicationsJanuary 2024March 2026Allow2610NoNo
18410733DETECTING HOMOGRAPHS OF DOMAIN NAMESJanuary 2024January 2025Allow1310NoNo
18403093MACHINE LEARNING FOR IDENTITY ACCESS MANAGEMENTJanuary 2024February 2026Allow2520NoNo
18542654Securing a file system of a remote stand-alone systemDecember 2023December 2025Allow2410NoNo
18538178SOURCING INFORMATION FOR A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORKDecember 2023February 2025Allow1420NoNo
18536223METHOD OF REMEDIATING OPERATIONS PERFORMED BY A PROGRAM AND SYSTEM THEREOFDecember 2023January 2025Allow1310NoNo
18535214PRIVACY-AWARE MEETING ROOM TRANSCRIPTION FROM AUDIO-VISUAL STREAMDecember 2023November 2024Allow1120YesNo
18512406DATA PROCESSING METHOD, APPARATUS AND COMPUTER READABLE STORAGE MEDIUM FOR IMPROVING SECURITY OF DATA STORAGE, BASED ON TRUSTED EXECUTION ENVIRONMENTNovember 2023September 2025Allow2210NoNo
18508232IDENTITY VERIFICATION SYSTEM, USER DEVICE AND IDENTITY VERIFICATION METHODNovember 2023September 2025Allow2210NoNo
18388774VERIFIER GENERATED COMMON REFERENCE STRING FOR ZERO-KNOWLEDGE PROOFSNovember 2023October 2025Allow2300NoNo
18386893SYSTEM FOR DYNAMICALLY TRACKING RESOURCES USING NON-FUNGIBLE TOKENSNovember 2023June 2024Allow700YesNo
18557868INFORMATION PROCESSING METHOD, DEVICE, AND RECORDING MEDIUMOctober 2023December 2025Abandon2610NoNo
18496030SYSTEM AND METHOD FOR MANAGING DATA PROCESSING SYSTEMS AND HOSTED DEVICESOctober 2023January 2026Allow2710NoNo
18556477TECHNIQUE FOR CONSTRAINING ACCESS TO MEMORY USING CAPABILITIESOctober 2023December 2025Allow2610NoNo
18381735STEALTHY PROCESS ATTACK DETECTION FOR AUTOMATED MANUFACTURINGOctober 2023May 2025Allow1900NoNo
18381425WEB PAGE CONFIGURATION USING CERTIFICATE CHAIN OF TRUSTOctober 2023January 2026Allow2710YesNo
18380322Pre-Authentication for Interactive Voice Response SystemOctober 2023November 2025Allow2510NoNo
18485773SYSTEMS AND METHODS FOR INITIALIZING A DISTRIBUTED CRYPTOGRAPHY AS A SERVICE APPLICATIONOctober 2023May 2025Allow1900NoNo
18483101REMOTE ACCESS VIA SYSTEM-LEVEL TRUSTED AUTHORITIESOctober 2023November 2025Allow2520NoNo
18481681CLOUD-BASED SYSTEM FOR PROTECTING SENSITIVE INFORMATION IN SHARED CONTENTOctober 2023August 2024Allow1010NoNo
18466876CYBERSECURITY RISK ASSESSMENT ON AN INDUSTRY BASISSeptember 2023October 2024Allow1310NoNo
18462202Systems and Methods for Vehicle Message SigningSeptember 2023January 2025Allow1620YesNo
18459695PROVIDING SECURE TRACE MESSAGE COMMUNICATIONS USING SYMMETRIC ENCRYPTION AND AUTHENTICATIONSeptember 2023August 2025Allow2410NoNo
18279720VERIFIABLE COMPUTING USING COMPUTATION FINGERPRINT WITHIN FULLY HOMOMORPHIC ENCRYPTION (FHE)August 2023November 2025Allow2710NoNo
18447565SYSTEMS AND METHODS FOR DETERMINING AUTHENTICITY OF NON-FUNGIBLE DIGITAL ASSETSAugust 2023July 2024Allow1210NoNo
18363176SECURITY PLUGIN FOR A SYSTEM-ON-A-CHIP PLATFORMAugust 2023May 2024Allow910YesNo
18358207VALIDATION OF SIGNATURES OF A VIDEO STREAM ENCODED IN LAYERSJuly 2023November 2025Allow2810NoNo
18346377SYSTEMS AND METHODS FOR PASSIVE CONTINUOUS SESSION AUTHENTICATIONJuly 2023July 2024Allow1310YesNo
18344527CONTINUOUS MULTIFACTOR AUTHENTICATION SYSTEM INTEGRATION WITH CORPORATE SECURITY SYSTEMSJune 2023June 2024Allow1110YesNo
18214853CYBERSECURITY RISK ASSESSMENT AND MEASUREMENTJune 2023January 2026Allow3010NoNo
18339203COMPUTING ITEM FINDABILITY THROUGH A FINDABILITY MACHINE-LEARNING MODELJune 2023February 2026Allow3200NoNo
18333296SECURE MESSAGE SEARCHJune 2023June 2024Allow1210NoNo
18255059METHOD AND COMMUNICATION SYSTEM FOR OBTAINING RIGHT OF DEVICE CONTROL BASED ON ENCRYPTIONMay 2023July 2025Allow2610NoNo
18039034METHOD FOR SECURE REAL-TIME MESSAGE TRANSMISSION BETWEEN A TRANSMITTER AND A RECEIVER WHICH ARE ON BOARD A MOTOR VEHICLEMay 2023May 2025Allow2400NoNo
18036934System and Method for Improving the Efficiency in Vehicular Data Access While Maintaining Data SecurityMay 2023March 2026Abandon3420NoNo
18314543PROVIDING QUANTUM KEY DISTRIBUTION KEY DELIVERY PROOF OF ORIGIN AND TRANSITMay 2023March 2025Allow2300NoNo
18312627APPARATUS, METHODS, AND COMPUTER PROGRAMS FOR PROTECTING SENSITIVE DATAMay 2023August 2025Allow2720NoNo
18311092METHODS AND PROCESSES FOR UTILIZING INFORMATION COLLECTED FOR ENHANCED VERIFICATIONMay 2023March 2024Allow1010NoNo
18306495SYSTEM AND METHOD FOR COLLECTIVE DIGITAL SIGNATURE GROUPINGApril 2023September 2025Allow2910NoNo
18305669SIGNATURE-LESS SELF-AUTHENTICATING ENCRYPTED MESSAGES VIA ASYMMETRIC KEY PAIRSApril 2023November 2025Abandon3110NoNo
18295274SECURE PROCESSOR FOR POST-QUANTUM CRYPTOGRAPHY ALGORITHM CRYSTALS-KYBERApril 2023December 2024Allow2000NoNo
18194278Metered Distribution of Quantum EntanglementMarch 2023August 2025Allow2910NoNo
18028499System and Methods for Secure Communication Using Post-Quantum CryptographyMarch 2023April 2025Allow2510NoNo
18183488PROVIDING SECURITY FOR EDGE COMPUTING USING LOCATION DATAMarch 2023April 2025Allow2500NoNo
18179119POLICY BASED PERSONALLY IDENTIFIABLE INFORMATION LEAKAGE PREVENTION IN CLOUD NATIVE ENVIRONMENTSMarch 2023February 2024Allow1220YesNo
17924680ELECTRONIC DEVICES RELATED TO PHYSIOLOGICAL CERTIFICATE USING BIOMETRICS TECHNOLOGY AND METHODS FOR OPERATION THEREOFMarch 2023January 2026Allow3910NoNo
18024567SYSTEM AND METHOD FOR PREVENTING FRAUDULENT DEVICE ACCESS USING MULTI-AREA BIOMETRIC AND VITAL SIGN AUTHENTICATIONMarch 2023August 2025Allow3010NoNo
18109409SECURITY VULNERABILITY DETECTION FOR IMAGE FILESFebruary 2023April 2025Allow2600NoNo
18108174LOCALIZED DATA STORAGE AND PROCESSINGFebruary 2023December 2023Allow1010YesNo
18103389MALWARE PROTECTION FOR VIRTUAL MACHINESJanuary 2023May 2025Allow2740YesNo
18099084CRYPTOGRAPHIC RANDOM IDENTIFICATION (CRID) FOR AUTHENTICATION AND INDENTIFICATION OF USERSJanuary 2023March 2025Allow2610NoNo
18092083Advanced Threat Protection Cross-Product Security ControllerDecember 2022May 2024Allow1620YesNo
18083881ELECTRONIC DEVICE, METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA FOR EXECUTING SETUP VIA COMMUNICATION WITH ANOTHER DEVICEDecember 2022February 2025Allow2600NoNo
18081759DEVICE PROTECTION USING PRE-EXECUTION MULTI-FACTOR PROCESS AUTHENTICATIONDecember 2022September 2025Allow3320YesNo
18065560PROCESSOR AND ATTACK DETECTION METHOD THEREOF FOR DETECTING JUMP-ORIENTED PROGRAMMING ATTACKDecember 2022April 2025Allow2810NoNo
18079933Zero Trust Network Access and Virtual Private Network Client OffloadingDecember 2022September 2025Abandon3310NoNo
18055541SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY ON A SMARTCARDNovember 2022September 2024Allow2200NoNo
18055109COMPUTERIZED SYSTEM AND METHOD FOR ASSOCIATING RF SIGNALSNovember 2022January 2024Allow1410NoNo
17975947METHODS AND SYSTEMS FOR TRACKING AND RECOVERING ASSETS STOLEN ON DISTRIBUTED LEDGER-BASED NETWORKSOctober 2022January 2023Allow300NoNo
17975964METHODS AND SYSTEMS FOR TRACKING AND RECOVERING ASSETS STOLEN ON DISTRIBUTED LEDGER-BASED NETWORKSOctober 2022January 2023Allow300NoNo
17976003METHODS AND SYSTEMS FOR TRACKING AND RECOVERING ASSETS STOLEN ON DISTRIBUTED LEDGER-BASED NETWORKSOctober 2022January 2023Allow300NoNo
17973274TECHNIQUES FOR MONITORING PRIVILEGED USERS AND DETECTING ANOMALOUS ACTIVITIES IN A COMPUTING ENVIRONMENTOctober 2022November 2025Allow3720NoYes
18047437METHOD OF REMEDIATING OPERATIONS PERFORMED BY A PROGRAM AND SYSTEM THEREOFOctober 2022September 2023Allow1010NoNo
17961515MACHINE LEARNING FOR IDENTITY ACCESS MANAGEMENTOctober 2022October 2023Allow1210NoNo
17930242Secure data transfer in a virtual environment using blockchainSeptember 2022July 2024Allow2200NoNo
17929811INFORMATION PROCESSING APPARATUS, METHOD, AND MEDIUM FOR LOGIN WITH DUPLICATE IDENTIFIERSSeptember 2022November 2024Allow2610NoNo
17800642GATE SYSTEM, GATE APPARATUS, AND IMAGE PROCESSING METHOD THEREFORAugust 2022June 2025Abandon3410NoNo
17818113TECHNIQUES FOR SECURING SERVICES USING INTER-SERVICE VISIBILITYAugust 2022March 2025Allow3210NoNo
17869370COMMUNICATIONS SYSTEM TO ADJUST A SIGNAL SCRAMBLERJuly 2022January 2026Allow4210YesNo
17866760ELECTRONIC DEVICE AND OPERATING METHOD FOR PROVIDING AN OPERATING NOTIFICATION FOR DEVICE INCLUDED IN THE ELECTRONIC DEVICEJuly 2022March 2025Allow3210YesNo
17793110ATTACK INFORMATION PROCESSING APPARATUS, METHOD, AND COMPUTER READABLE MEDIUM THAT EXTRACTS KNOWLEDGE PIECESJuly 2022February 2025Allow3110NoNo
17851450PREDICTIVE SCAN ENGINE RUNTIME DURATIONSJune 2022January 2025Allow3110NoNo
17851195Network Security Protection Method and Protection DeviceJune 2022September 2024Allow2610NoNo
17851118ATTACK ANALYZER FOR ACCURATE ESTIMATION OF ATTACK ROUTEJune 2022August 2024Allow2510YesNo
17851183METHOD FOR DETECTING RDP LOGIN ANOMALYJune 2022October 2024Allow2810YesNo
17852062PERFORMING 5G LAN SECURITY BASED ON 5G LAN RELATED PARAMETERSJune 2022July 2025Allow3720YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner GOODCHILD, WILLIAM J.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
20
Examiner Affirmed
16
(80.0%)
Examiner Reversed
4
(20.0%)
Reversal Percentile
31.9%
Lower than average

What This Means

With a 20.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
87
Allowed After Appeal Filing
25
(28.7%)
Not Allowed After Appeal Filing
62
(71.3%)
Filing Benefit Percentile
43.1%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 28.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner GOODCHILD, WILLIAM J - Prosecution Strategy Guide

Executive Summary

Examiner GOODCHILD, WILLIAM J works in Art Unit 2433 and has examined 656 patent applications in our dataset. With an allowance rate of 85.4%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 30 months.

Allowance Patterns

Examiner GOODCHILD, WILLIAM J's allowance rate of 85.4% places them in the 62% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by GOODCHILD, WILLIAM J receive 2.24 office actions before reaching final disposition. This places the examiner in the 62% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by GOODCHILD, WILLIAM J is 30 months. This places the examiner in the 59% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +11.9% benefit to allowance rate for applications examined by GOODCHILD, WILLIAM J. This interview benefit is in the 47% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 26.8% of applications are subsequently allowed. This success rate is in the 45% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 38.7% of cases where such amendments are filed. This entry rate is in the 59% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 81.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 64% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 76.7% of appeals filed. This is in the 68% percentile among all examiners. Of these withdrawals, 48.5% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.

Petition Practice

When applicants file petitions regarding this examiner's actions, 26.8% are granted (fully or in part). This grant rate is in the 14% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.6% of allowed cases (in the 62% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.4% of allowed cases (in the 53% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

    Relevant MPEP Sections for Prosecution Strategy

    • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
    • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
    • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
    • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
    • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
    • MPEP § 1214.07: Reopening prosecution after appeal

    Important Disclaimer

    Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

    No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

    Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

    Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.