USPTO Examiner JHAVERI JAYESH M - Art Unit 2433

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19269404Deriving Input Restrictions for Artificial Intelligence AgentsJuly 2025October 2025Allow300YesNo
19269354Deriving Input Restrictions for Artificial Intelligence AgentsJuly 2025October 2025Allow310YesNo
19269462Deriving Input Restrictions for Artificial Intelligence AgentsJuly 2025March 2026Allow800YesNo
19269215Management of Connector Services and Connected Artificial Intelligence Agents for Message SendersJuly 2025September 2025Allow200YesNo
19234232Automated Tool Discovery and Ingestion for Artificial Intelligence AgentsJune 2025August 2025Allow200YesNo
19170041Systems and Methods for a Hierarchical Record-Level Security ArchitectureApril 2025July 2025Allow400YesNo
19067812Management of Connector Services and Connected Artificial Intelligence Agents for Message SendersFebruary 2025May 2025Allow200NoNo
19034984METHODS AND SYSTEMS FOR ENHANCING DETECTION OF FRAUDULENT AUTHENTICATION DATAJanuary 2025June 2025Allow510YesNo
18978819SYSTEM AND METHOD FOR DEVICE-SPECIFIC CRYPTOGRAPHIC KEYDecember 2024March 2025Allow300YesNo
18962991PROVIDING ACCESS TO COMPOSITE AI-GENERATED DATANovember 2024July 2025Allow810NoNo
18948343Agent Functionality Extensions Using SurveyorsNovember 2024March 2025Allow410YesNo
18946880DERIVING INPUT RESTRICTIONS FOR ARTIFICIAL INTELLIGENCE AGENTSNovember 2024May 2025Allow610NoNo
18923367EVENT BASED AUTHENTICATIONOctober 2024February 2026Allow1600NoNo
18922304SIGNAL PROTECTION AND RETRIEVAL BY NON-LINEAR ANALOG MODULATIONOctober 2024March 2026Allow1700YesNo
18886003SYSTEMS AND METHODS FOR PROVIDING PRIORITY FOR USER EQUIPMENTSeptember 2024January 2026Allow1600YesNo
18886124System and method to detect boot kit attacksSeptember 2024December 2025Allow1500NoNo
18795878SYSTEM AND METHOD FOR MODELLING A CYBER-PHYSICAL SYSTEM TO ACT AS A HONEYPOT FOR CYBERATTACKSAugust 2024February 2025Allow610NoNo
18761930GENERATION AND USE OF PSEUDO-MALWARE FOR BLACK BOX TESTING OF CYBERSECURITY SYSTEMSJuly 2024November 2025Allow1700NoNo
18670086TRANSFORMED ONE TIME PASSWORD (OTP) FOR AUTHENTICATIONMay 2024January 2026Allow2010YesNo
18650636APPLICATION TRUST FRAMEWORKApril 2024February 2025Allow1010NoNo
18645226VISIBLE LIGHT COMMUNICATION (VLC) BASED MULTI-FACTOR AUTHENTICATION (MFA) MECHANISM FOR EDGE DEVICESApril 2024October 2025Allow1800YesNo
18643940VIRTUALIZED CONTROLLERS FOR IN-VEHICLE AND IOT NETWORKSApril 2024May 2025Abandon1310NoNo
18621838SIGNAL PROTECTION AND RETRIEVAL BY NON-LINEAR ANALOG MODULATIONMarch 2024June 2024Allow300YesNo
18617299PRESERVING WEB PAGE FUNCTIONALITY THROUGH DYNAMIC ANALYSIS OF HOST WEB PAGESMarch 2024April 2025Allow1320NoNo
18614421PROVIDING OUTCOME EXPLANATION FOR ALGORITHMIC DECISIONSMarch 2024June 2025Allow1410YesNo
18600391Ensemble Intrusion Detection System for IoT PlatformsMarch 2024July 2025Allow1600YesNo
18588839DATABASE REDACTION FOR SEMI-STRUCTURED AND UNSTRUCTURED DATAFebruary 2024January 2025Allow1110YesNo
18585443DATA TRANSMISSION METHOD AND APPARATUS THEREOFFebruary 2024August 2025Allow1800YesNo
18408563UNIFIED PROGRAMMING ENVIRONMENT FOR PROGRAMMABLE DEVICESJanuary 2024April 2025Abandon1510NoNo
18404190SECURED DIRECT ACCESS FOR CUSTOMER SERVICEJanuary 2024November 2025Allow2200NoNo
18573441DATA MANAGEMENT SYSTEMDecember 2023February 2026Abandon2510NoNo
18544391DATABASE LOG ANALYZER IN A CLOUD ENVIRONMENT USING MICROSERVICE ORCHESTRATIONDecember 2023September 2024Allow900YesNo
18529702SYSTEM AND METHOD FOR DIFFERENTIAL MALWARE SCANNERDecember 2023December 2024Allow1210YesNo
18524999STATIC ANALYSIS CORRELATION SCANNERSNovember 2023June 2025Allow1900YesNo
18522449SYSTEM AND METHOD FOR PREVENTING AND MITIGATING MALICIOUS PROCESSES BY ANALYZING LIVE DATANovember 2023January 2026Allow2510NoNo
18512670Host Level Data Analytics for Cyberattack DetectionNovember 2023October 2025Allow2310NoNo
18504502MEDIA STREAMINGNovember 2023October 2024Allow1110NoNo
18503930SECURE COPY-PASTE METHOD AND SYSTEMNovember 2023January 2024Allow200YesNo
18497205IDENTITY RESOLUTION AND DATA ENRICHMENT APPLICATION FRAMEWORKOctober 2023October 2024Allow1110NoNo
18481072FILE SCANNER TO DETECT MALICIOUS ELECTRONIC FILESOctober 2023October 2024Allow1210YesNo
18478478PACKET CLASSIFICATION FOR NETWORK ROUTINGSeptember 2023September 2024Allow1110YesNo
18372735PROCESSING SYSTEM, PROCESSING METHOD, AND PROCESSING PROGRAMSeptember 2023September 2025Allow2410NoNo
18468341BIOMETRIC AUTHENTICATION METHOD CAPABLE OF SECURELY MANAGING TEMPLATE PIECES OF BIOMETRIC INFORMATION WITH ENCRYPTIONSeptember 2023April 2025Allow1900YesNo
18244452WEB BROWSER-BASED SECURE EQUIPMENT ACCESSSeptember 2023December 2025Allow2710YesNo
18461780PROCESSOR AND OPERATING METHOD FOR A HOMOGENEOUS DUAL COMPUTING SYSTEMSeptember 2023January 2026Allow2920NoNo
18239527DATABASE REDACTION FOR SEMI-STRUCTURED AND UNSTRUCTURED DATAAugust 2023January 2024Allow510YesNo
18453673END-TO-END TCP MONITORING DURING APPLICATION MIGRATIONAugust 2023May 2025Allow2000YesNo
18364939Authorization Decisions Using Conditioned Permissions for Resource CollectionsAugust 2023April 2025Allow2000YesNo
18228833VEHICLE CONTROL SYSTEM AND VEHICLE CONTROL METHODAugust 2023August 2025Allow2510YesNo
18228546IMPLEMENTING INHERITED GRANTS USING SECURE SCHEMASJuly 2023August 2024Allow1310YesNo
18227818GRANT INHERITANCE IN RBACJuly 2023July 2024Allow1220YesNo
18223523IMAGE PROCESSING APPARATUS AND VIRUS CHECK METHOD FOR THE SAMEJuly 2023June 2025Allow2300YesNo
18272802GENERATION DEVICE, GENERATION METHOD, AND GENERATION PROGRAMJuly 2023July 2025Allow2410NoNo
18272094FALSIFICATION DETECTION DEVICE, FALSIFICATION DETECTION METHOD, AND FALSIFICATION DETECTION PROGRAMJuly 2023May 2025Allow2210YesNo
18220882RANSOMWARE SAFE FILESYSTEM (RSFS)July 2023April 2025Allow2100NoNo
18347467SENSOR-BASED HUMAN AUTHORIZATION EVALUATIONJuly 2023July 2024Allow1210YesNo
18213627DETECTING MALWARE ACTIVITY USING KERNEL-BASED PROCESS DISCOVERY DETECTIONJune 2023December 2025Allow2910YesNo
18256778Management method for authenticating a user of a device on an equipment item by passwordJune 2023July 2025Allow2510YesNo
18207656CLOUD ENVIRONMENT DATABASE LOG ANALYZER WITH RISK SIGNATURE DETECTIONJune 2023September 2023Allow300YesNo
18324500COMPUTER-BASED SYSTEMS CONFIGURED FOR ONE-TIME PASSCODE (OTP) PROTECTION AND METHODS OF USE THEREOFMay 2023January 2024Allow700YesNo
18323607AUGMENTED SECURITY RECOGNITION TASKSMay 2023December 2024Allow1810YesNo
18321974IDENTITY RESOLUTION AND DATA ENRICHMENT APPLICATION FRAMEWORKMay 2023August 2023Allow300YesNo
18143332SECRET ZERO GENERATION AND USAGEMay 2023March 2025Allow2200YesNo
18141093MALICIOUS PATTERN EXTRACTION VIA FUZZINGApril 2023October 2025Allow3010YesNo
18139635SECURE IN-MEMORY DATABASE IN CONTAINERApril 2023February 2024Allow1010NoNo
18306877ATTACK MITIGATION IN A PACKET-SWITCHED NETWORKApril 2023March 2024Allow1110YesNo
18137548METHOD AND APPARATUS FOR MANAGING MULTIMEDIA FILE RELATED TO DOCUMENTApril 2023December 2025Abandon3201NoNo
18304063DATABASE REDACTION FOR SEMI-STRUCTURED AND UNSTRUCTURED DATAApril 2023August 2023Allow400YesNo
18301366Real-time shellcode detection and preventionApril 2023March 2025Allow2310YesNo
18295027MALWARE DETECTION VIA TRACING CALLS RATE TO OBTAIN FILE ATTRIBUTESApril 2023March 2026Allow3520YesNo
18194624RANSOMWARE DETECTION VIA MONITORING OPEN FILE OR PROCESSApril 2023June 2025Allow2710YesNo
18118699DETECTING SUSPECTED MALWARE IN OPEN-SOURCE DEPENDENCIESMarch 2023January 2025Allow2300YesNo
18115647QUERY MANAGEMENT IN A STREAMING SYSTEMFebruary 2023January 2025Allow2300YesNo
18172614PARALLEL AND INCREMENTAL PROCESSING TECHNIQUES FOR DATA PROTECTIONFebruary 2023May 2023Allow300NoNo
18168852APPLICATION TRUST FRAMEWORKFebruary 2023January 2024Allow1120NoNo
18166595INITIATING PROVISIONING OF AN EXISTING ACCOUNT BASED ON AN UNAUTHENTICATED REQUESTFebruary 2023February 2024Allow1210NoNo
18162645FILE ANALYSIS ENGINES FOR IDENTIFYING SECURITY-RELATED THREATSJanuary 2023April 2025Allow2610YesNo
18162696IDENTITY RESOLUTION AND DATA ENRICHMENT APPLICATION FRAMEWORK USING SHARED DATA OBJECTSJanuary 2023April 2023Allow300YesNo
18158668SOCKET TRANSFERRING FOR HPC NETWORKS USING KERNEL TRACINGJanuary 2023November 2023Allow1010YesNo
18097740Network Threat PreventionJanuary 2023April 2024Allow1520NoNo
18154764ADDITIONAL SECURITY WITH WRAPPED PROGRAM INCLUDING PAYLOAD AND ADMINISTRATIVE CREDENTIALJanuary 2023November 2023Allow1000YesNo
18149843SYSTEM AND METHODS FOR SMART FLUID TRANSFER REGISTER APPLICATIONSJanuary 2023January 2026Allow3610YesNo
18089474APPARATUS AND METHODS FOR AN APPLICATION PROGRAMMING INTERFACE TO DETECT AND LOCATE MALWARE IN MEMORYDecember 2022October 2024Allow2200YesNo
18083102METHOD AND SYSTEM FOR INCREMENTAL CENTROID CLUSTERINGDecember 2022August 2025Allow3210YesNo
18063372SHAPE OVERLAY FOR PROOF OF LIVENESSDecember 2022March 2025Allow2710NoNo
18071875System, Method, and Apparatus for Authenticating a User DeviceNovember 2022July 2023Allow800YesNo
18060547SYSTEM AND METHOD FOR DEVICE-SPECIFIC CRYPTOGRAPHIC KEYNovember 2022October 2024Allow2200YesNo
17991275SYSTEM AND METHOD FOR DIFFERENTIAL MALWARE SCANNERNovember 2022October 2023Allow1010YesNo
17986821EFFICIENT MANAGEMENT OF COMPLEX ATTACK SURFACESNovember 2022October 2024Allow2300YesNo
18054143SOCIAL MEDIA NETWORK INTERFACE FEATURES CONNECTED TO CRYPTOGRAPHIC LEDGERNovember 2022October 2025Abandon3510NoNo
17980781SYSTEM, METHOD AND ARCHITECTURE FOR SECURE SHARING OF CUSTOMER INTELLIGENCENovember 2022July 2025Allow3210NoNo
17979004Advanced ransomware detectionNovember 2022February 2025Allow2740NoNo
17922103Method and Apparatus for Controlling Mobile Storage Device, and Computer-Readable MediumOctober 2022September 2023Allow1010YesNo
18049092SYSTEMS AND METHODS FOR EXTERNAL ACCOUNT AUTHENTICATIONOctober 2022June 2025Allow3210YesNo
17963506TECHNIQUES TO AUTOMATICALLY UPDATE PAYMENT INFORMATION IN A COMPUTE ENVIRONMENTOctober 2022August 2024Allow2320NoNo
17917083Meta-Estimation of Bloom Filters with Vectors of CountsOctober 2022September 2024Allow2410YesNo
17953195TIME BASED TRIGGERING OF DYNAMIC TEMPLATESSeptember 2022August 2023Allow1110NoNo
17947973SENSOR-BASED HUMAN AUTHORIZATION EVALUATIONSeptember 2022April 2023Allow700YesNo
17942921INDICATION OF DIGITAL MEDIAL INTEGRITYSeptember 2022June 2025Allow3310NoNo
17902220ELECTRONIC APPARATUS AND SECURITY PROTECTION METHODSeptember 2022November 2024Allow2710NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner JHAVERI, JAYESH M.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
5
Examiner Affirmed
3
(60.0%)
Examiner Reversed
2
(40.0%)
Reversal Percentile
61.6%
Higher than average

What This Means

With a 40.0% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
10
Allowed After Appeal Filing
6
(60.0%)
Not Allowed After Appeal Filing
4
(40.0%)
Filing Benefit Percentile
88.7%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 60.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner JHAVERI, JAYESH M - Prosecution Strategy Guide

Executive Summary

Examiner JHAVERI, JAYESH M works in Art Unit 2433 and has examined 569 patent applications in our dataset. With an allowance rate of 85.4%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 27 months.

Allowance Patterns

Examiner JHAVERI, JAYESH M's allowance rate of 85.4% places them in the 62% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by JHAVERI, JAYESH M receive 1.40 office actions before reaching final disposition. This places the examiner in the 22% percentile for office actions issued. This examiner issues significantly fewer office actions than most examiners.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by JHAVERI, JAYESH M is 27 months. This places the examiner in the 72% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +33.7% benefit to allowance rate for applications examined by JHAVERI, JAYESH M. This interview benefit is in the 82% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 36.8% of applications are subsequently allowed. This success rate is in the 84% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 47.1% of cases where such amendments are filed. This entry rate is in the 71% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 7% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 58.3% of appeals filed. This is in the 32% percentile among all examiners. Of these withdrawals, 42.9% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 21.4% are granted (fully or in part). This grant rate is in the 11% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.7% of allowed cases (in the 64% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • RCEs are effective: This examiner has a high allowance rate after RCE compared to others. If you receive a final rejection and have substantive amendments or arguments, an RCE is likely to be successful.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.