Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18978819 | SYSTEM AND METHOD FOR DEVICE-SPECIFIC CRYPTOGRAPHIC KEY | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18948343 | Agent Functionality Extensions Using Surveyors | November 2024 | March 2025 | Allow | 4 | 1 | 0 | Yes | No |
| 18795878 | SYSTEM AND METHOD FOR MODELLING A CYBER-PHYSICAL SYSTEM TO ACT AS A HONEYPOT FOR CYBERATTACKS | August 2024 | February 2025 | Allow | 6 | 1 | 0 | No | No |
| 18650636 | APPLICATION TRUST FRAMEWORK | April 2024 | February 2025 | Allow | 10 | 1 | 0 | No | No |
| 18643940 | VIRTUALIZED CONTROLLERS FOR IN-VEHICLE AND IOT NETWORKS | April 2024 | May 2025 | Abandon | 13 | 1 | 0 | No | No |
| 18621838 | SIGNAL PROTECTION AND RETRIEVAL BY NON-LINEAR ANALOG MODULATION | March 2024 | June 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18617299 | PRESERVING WEB PAGE FUNCTIONALITY THROUGH DYNAMIC ANALYSIS OF HOST WEB PAGES | March 2024 | April 2025 | Allow | 13 | 2 | 0 | No | No |
| 18614421 | PROVIDING OUTCOME EXPLANATION FOR ALGORITHMIC DECISIONS | March 2024 | June 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18588839 | DATABASE REDACTION FOR SEMI-STRUCTURED AND UNSTRUCTURED DATA | February 2024 | January 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18408563 | UNIFIED PROGRAMMING ENVIRONMENT FOR PROGRAMMABLE DEVICES | January 2024 | April 2025 | Abandon | 15 | 1 | 0 | No | No |
| 18544391 | DATABASE LOG ANALYZER IN A CLOUD ENVIRONMENT USING MICROSERVICE ORCHESTRATION | December 2023 | September 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18529702 | SYSTEM AND METHOD FOR DIFFERENTIAL MALWARE SCANNER | December 2023 | December 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18524999 | STATIC ANALYSIS CORRELATION SCANNERS | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18504502 | MEDIA STREAMING | November 2023 | October 2024 | Allow | 11 | 1 | 0 | No | No |
| 18503930 | SECURE COPY-PASTE METHOD AND SYSTEM | November 2023 | January 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18497205 | IDENTITY RESOLUTION AND DATA ENRICHMENT APPLICATION FRAMEWORK | October 2023 | October 2024 | Allow | 11 | 1 | 0 | No | No |
| 18481072 | FILE SCANNER TO DETECT MALICIOUS ELECTRONIC FILES | October 2023 | October 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18478478 | PACKET CLASSIFICATION FOR NETWORK ROUTING | September 2023 | September 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18468341 | BIOMETRIC AUTHENTICATION METHOD CAPABLE OF SECURELY MANAGING TEMPLATE PIECES OF BIOMETRIC INFORMATION WITH ENCRYPTION | September 2023 | April 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18239527 | DATABASE REDACTION FOR SEMI-STRUCTURED AND UNSTRUCTURED DATA | August 2023 | January 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18453673 | END-TO-END TCP MONITORING DURING APPLICATION MIGRATION | August 2023 | May 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18364939 | Authorization Decisions Using Conditioned Permissions for Resource Collections | August 2023 | April 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18228546 | IMPLEMENTING INHERITED GRANTS USING SECURE SCHEMAS | July 2023 | August 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18227818 | GRANT INHERITANCE IN RBAC | July 2023 | July 2024 | Allow | 12 | 2 | 0 | Yes | No |
| 18223523 | IMAGE PROCESSING APPARATUS AND VIRUS CHECK METHOD FOR THE SAME | July 2023 | June 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18272094 | FALSIFICATION DETECTION DEVICE, FALSIFICATION DETECTION METHOD, AND FALSIFICATION DETECTION PROGRAM | July 2023 | May 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18220882 | RANSOMWARE SAFE FILESYSTEM (RSFS) | July 2023 | April 2025 | Allow | 21 | 0 | 0 | No | No |
| 18347467 | SENSOR-BASED HUMAN AUTHORIZATION EVALUATION | July 2023 | July 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18256778 | Management method for authenticating a user of a device on an equipment item by password | June 2023 | July 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18207656 | CLOUD ENVIRONMENT DATABASE LOG ANALYZER WITH RISK SIGNATURE DETECTION | June 2023 | September 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 18324500 | COMPUTER-BASED SYSTEMS CONFIGURED FOR ONE-TIME PASSCODE (OTP) PROTECTION AND METHODS OF USE THEREOF | May 2023 | January 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18323607 | AUGMENTED SECURITY RECOGNITION TASKS | May 2023 | December 2024 | Allow | 18 | 1 | 0 | Yes | No |
| 18321974 | IDENTITY RESOLUTION AND DATA ENRICHMENT APPLICATION FRAMEWORK | May 2023 | August 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 18143332 | SECRET ZERO GENERATION AND USAGE | May 2023 | March 2025 | Allow | 22 | 0 | 0 | Yes | No |
| 18139635 | SECURE IN-MEMORY DATABASE IN CONTAINER | April 2023 | February 2024 | Allow | 10 | 1 | 0 | No | No |
| 18306877 | ATTACK MITIGATION IN A PACKET-SWITCHED NETWORK | April 2023 | March 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18304063 | DATABASE REDACTION FOR SEMI-STRUCTURED AND UNSTRUCTURED DATA | April 2023 | August 2023 | Allow | 4 | 0 | 0 | Yes | No |
| 18301366 | Real-time shellcode detection and prevention | April 2023 | March 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18194624 | RANSOMWARE DETECTION VIA MONITORING OPEN FILE OR PROCESS | April 2023 | June 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18118699 | DETECTING SUSPECTED MALWARE IN OPEN-SOURCE DEPENDENCIES | March 2023 | January 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18115647 | QUERY MANAGEMENT IN A STREAMING SYSTEM | February 2023 | January 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18172614 | PARALLEL AND INCREMENTAL PROCESSING TECHNIQUES FOR DATA PROTECTION | February 2023 | May 2023 | Allow | 3 | 0 | 0 | No | No |
| 18168852 | APPLICATION TRUST FRAMEWORK | February 2023 | January 2024 | Allow | 11 | 2 | 0 | No | No |
| 18166595 | INITIATING PROVISIONING OF AN EXISTING ACCOUNT BASED ON AN UNAUTHENTICATED REQUEST | February 2023 | February 2024 | Allow | 12 | 1 | 0 | No | No |
| 18162645 | FILE ANALYSIS ENGINES FOR IDENTIFYING SECURITY-RELATED THREATS | January 2023 | April 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18162696 | IDENTITY RESOLUTION AND DATA ENRICHMENT APPLICATION FRAMEWORK USING SHARED DATA OBJECTS | January 2023 | April 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 18158668 | SOCKET TRANSFERRING FOR HPC NETWORKS USING KERNEL TRACING | January 2023 | November 2023 | Allow | 10 | 1 | 0 | Yes | No |
| 18097740 | Network Threat Prevention | January 2023 | April 2024 | Allow | 15 | 2 | 0 | No | No |
| 18154764 | ADDITIONAL SECURITY WITH WRAPPED PROGRAM INCLUDING PAYLOAD AND ADMINISTRATIVE CREDENTIAL | January 2023 | November 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 18089474 | APPARATUS AND METHODS FOR AN APPLICATION PROGRAMMING INTERFACE TO DETECT AND LOCATE MALWARE IN MEMORY | December 2022 | October 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 18060547 | SYSTEM AND METHOD FOR DEVICE-SPECIFIC CRYPTOGRAPHIC KEY | November 2022 | October 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 18071875 | System, Method, and Apparatus for Authenticating a User Device | November 2022 | July 2023 | Allow | 8 | 0 | 0 | Yes | No |
| 17991275 | SYSTEM AND METHOD FOR DIFFERENTIAL MALWARE SCANNER | November 2022 | October 2023 | Allow | 10 | 1 | 0 | Yes | No |
| 17986821 | EFFICIENT MANAGEMENT OF COMPLEX ATTACK SURFACES | November 2022 | October 2024 | Allow | 23 | 0 | 0 | Yes | No |
| 17979004 | Advanced ransomware detection | November 2022 | February 2025 | Allow | 27 | 4 | 0 | No | No |
| 17922103 | Method and Apparatus for Controlling Mobile Storage Device, and Computer-Readable Medium | October 2022 | September 2023 | Allow | 10 | 1 | 0 | Yes | No |
| 18049092 | SYSTEMS AND METHODS FOR EXTERNAL ACCOUNT AUTHENTICATION | October 2022 | June 2025 | Allow | 32 | 1 | 0 | Yes | No |
| 17963506 | TECHNIQUES TO AUTOMATICALLY UPDATE PAYMENT INFORMATION IN A COMPUTE ENVIRONMENT | October 2022 | August 2024 | Allow | 23 | 2 | 0 | No | No |
| 17917083 | Meta-Estimation of Bloom Filters with Vectors of Counts | October 2022 | September 2024 | Allow | 24 | 1 | 0 | Yes | No |
| 17953195 | TIME BASED TRIGGERING OF DYNAMIC TEMPLATES | September 2022 | August 2023 | Allow | 11 | 1 | 0 | No | No |
| 17947973 | SENSOR-BASED HUMAN AUTHORIZATION EVALUATION | September 2022 | April 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 17942921 | INDICATION OF DIGITAL MEDIAL INTEGRITY | September 2022 | June 2025 | Allow | 33 | 1 | 0 | No | No |
| 17902220 | ELECTRONIC APPARATUS AND SECURITY PROTECTION METHOD | September 2022 | November 2024 | Allow | 27 | 1 | 0 | No | No |
| 17822928 | MALWARE IDENTIFICATION AND PROFILING | August 2022 | March 2025 | Abandon | 31 | 2 | 0 | No | No |
| 17888408 | DIGITAL CERTIFICATION SYSTEM | August 2022 | December 2023 | Abandon | 16 | 1 | 0 | No | No |
| 17813892 | USER-CENTRIC CLASSIFICATIONS FOR CRYPTOGRAPHIC TOKEN SETS | July 2022 | July 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17812698 | SYSTEMS AND METHODS FOR SELECTIVELY INDEXING BLOCKCHAIN OPERATIONS BASED ON IDENTIFYING UNINDEXED PARAMETERS | July 2022 | April 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 17864502 | SYSTEM AND METHOD FOR SECURING DIAGNOSTIC DATA COLLECTION USING DUAL ENCRYPTION | July 2022 | January 2025 | Allow | 30 | 1 | 0 | No | No |
| 17810237 | TIME-BASED LEADERBOARD DISPLAY ON SOCIAL MEDIA NETWORK | June 2022 | October 2023 | Allow | 15 | 0 | 0 | Yes | No |
| 17855764 | INTERNET PROTOCOL BASED SECURITY OVER PORT FORWARDING TUNNELS | June 2022 | May 2025 | Allow | 35 | 1 | 0 | Yes | No |
| 17851223 | UNIFIED PROGRAMMING ENVIRONMENT FOR PROGRAMMABLE DEVICES | June 2022 | August 2023 | Allow | 14 | 1 | 0 | Yes | No |
| 17808777 | AUTHORIZING SECURE CONNECTIONS RESPONSIVE TO CERTIFICATES BOUND TO LOGICAL IDENTIFIERS | June 2022 | November 2024 | Allow | 29 | 0 | 0 | Yes | No |
| 17844656 | CLASSIFICATION OF DATA FILES | June 2022 | October 2022 | Allow | 4 | 0 | 0 | Yes | No |
| 17843062 | MALWARE DETECTION USING FEDERATED LEARNING | June 2022 | October 2022 | Allow | 4 | 0 | 0 | Yes | No |
| 17843318 | MALWARE DETECTION USING FEDERATED LEARNING | June 2022 | June 2023 | Allow | 12 | 1 | 0 | No | No |
| 17843323 | MALWARE DETECTION USING FEDERATED LEARNING | June 2022 | May 2023 | Allow | 11 | 1 | 0 | No | No |
| 17843304 | MALWARE DETECTION USING FEDERATED LEARNING | June 2022 | March 2023 | Allow | 9 | 0 | 0 | Yes | No |
| 17842297 | EVENT BASED AUTHENTICATION | June 2022 | July 2024 | Allow | 25 | 1 | 0 | Yes | No |
| 17841483 | MEDIA STREAMING | June 2022 | August 2023 | Allow | 14 | 1 | 0 | Yes | No |
| 17839614 | PACKET CLASSIFICATION FOR NETWORK ROUTING | June 2022 | August 2023 | Allow | 14 | 1 | 0 | Yes | No |
| 17750955 | SYSTEM AND METHOD FOR ORGANIZATION AND CLASSIFICATION OF APPLICATION SECURITY VULNERABILITIES | May 2022 | November 2024 | Abandon | 30 | 1 | 0 | No | No |
| 17777502 | DATA MANAGEMENT SYSTEM | May 2022 | September 2024 | Allow | 28 | 0 | 0 | Yes | No |
| 17728579 | CLUSTERED VIRTUAL TRUSTED PLATFORM MODULE DOMAIN SERVICES SYSTEM | April 2022 | January 2025 | Allow | 33 | 1 | 0 | Yes | No |
| 17721757 | APPARATUS FOR PROCESSING CYBER THREAT INFORMATION, METHOD FOR PROCESSING CYBER THREAT INFORMATION, AND MEDIUM FOR STORING A PROGRAM PROCESSING CYBER THREAT INFORMATION | April 2022 | August 2024 | Allow | 28 | 1 | 0 | No | No |
| 17714261 | PREVENTING PHISHING ATTEMPTS OF ONE-TIME PASSWORDS | April 2022 | May 2025 | Abandon | 38 | 0 | 1 | No | No |
| 17710264 | SMART VERIFICATION OF AUTHENTICATION FOR USER LOG INS BASED ON RISK LEVELS | March 2022 | March 2025 | Allow | 35 | 1 | 1 | Yes | No |
| 17656876 | Optimal antimalware signatures database | March 2022 | December 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17704064 | Systems and Methods for Deriving Application Security Signals from Application Performance Data | March 2022 | January 2025 | Allow | 33 | 2 | 0 | Yes | No |
| 17655786 | WEB INTEGRATION, TIMING, ACCESS, AND DISTRIBUTION CONTROL | March 2022 | June 2024 | Allow | 26 | 0 | 0 | Yes | No |
| 17654978 | HASH SUBTREES FOR GROUPING COMPONENTS BY COMPONENT TYPE | March 2022 | June 2024 | Allow | 27 | 0 | 0 | Yes | No |
| 17652285 | Fast antimalware scan | February 2022 | April 2024 | Allow | 26 | 0 | 0 | Yes | No |
| 17680160 | METHOD, SYSTEM, APPARATUS AND DEVICE FOR DATA EXCHANGE | February 2022 | May 2022 | Allow | 2 | 0 | 0 | Yes | No |
| 17676785 | AUTHENTICATION SYSTEM WITH AN AUTOMATIC AUTHENTICATION MECHANISM AND AUTOMATIC AUTHENTICATION METHOD | February 2022 | April 2024 | Allow | 25 | 0 | 0 | Yes | No |
| 17651755 | TIME-BASED LEADERBOARD DISPLAY ON SOCIAL MEDIA NETWORK | February 2022 | June 2022 | Allow | 4 | 0 | 0 | Yes | No |
| 17591409 | MITIGATING MALWARE IMPACT BY UTILIZING SANDBOX INSIGHTS | February 2022 | October 2023 | Allow | 20 | 2 | 0 | Yes | Yes |
| 17649423 | AUTHENTICATION BASED ON CHAIN OF STRINGS GENERATED FROM SECRET STRING | January 2022 | January 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17589863 | PHYSIMETRIC-BASED DATA SECURITY FOR CODED DISTRIBUTED TEMPERATURE SENSING | January 2022 | June 2024 | Abandon | 29 | 1 | 0 | No | No |
| 17585442 | METHOD AND APPARATUS FOR CONTROL OF DATA ACCESS | January 2022 | January 2023 | Allow | 12 | 2 | 0 | Yes | No |
| 17580694 | SECURING SOFTWARE ROUTINES | January 2022 | June 2023 | Allow | 16 | 0 | 0 | No | No |
| 17575033 | SYSTEM AND METHOD FOR DIFFERENTIAL MALWARE SCANNER | January 2022 | July 2022 | Allow | 6 | 1 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner JHAVERI, JAYESH M.
With a 40.0% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 54.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner JHAVERI, JAYESH M works in Art Unit 2433 and has examined 660 patent applications in our dataset. With an allowance rate of 86.7%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 26 months.
Examiner JHAVERI, JAYESH M's allowance rate of 86.7% places them in the 60% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by JHAVERI, JAYESH M receive 1.30 office actions before reaching final disposition. This places the examiner in the 25% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by JHAVERI, JAYESH M is 26 months. This places the examiner in the 60% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +32.5% benefit to allowance rate for applications examined by JHAVERI, JAYESH M. This interview benefit is in the 83% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 37.3% of applications are subsequently allowed. This success rate is in the 82% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 46.2% of cases where such amendments are filed. This entry rate is in the 65% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 6% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 61.5% of appeals filed. This is in the 34% percentile among all examiners. Of these withdrawals, 50.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 21.2% are granted (fully or in part). This grant rate is in the 12% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.6% of allowed cases (in the 62% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.7% of allowed cases (in the 52% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.