USPTO Examiner JHAVERI JAYESH M - Art Unit 2433

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18978819SYSTEM AND METHOD FOR DEVICE-SPECIFIC CRYPTOGRAPHIC KEYDecember 2024March 2025Allow300YesNo
18948343Agent Functionality Extensions Using SurveyorsNovember 2024March 2025Allow410YesNo
18795878SYSTEM AND METHOD FOR MODELLING A CYBER-PHYSICAL SYSTEM TO ACT AS A HONEYPOT FOR CYBERATTACKSAugust 2024February 2025Allow610NoNo
18650636APPLICATION TRUST FRAMEWORKApril 2024February 2025Allow1010NoNo
18643940VIRTUALIZED CONTROLLERS FOR IN-VEHICLE AND IOT NETWORKSApril 2024May 2025Abandon1310NoNo
18621838SIGNAL PROTECTION AND RETRIEVAL BY NON-LINEAR ANALOG MODULATIONMarch 2024June 2024Allow300YesNo
18617299PRESERVING WEB PAGE FUNCTIONALITY THROUGH DYNAMIC ANALYSIS OF HOST WEB PAGESMarch 2024April 2025Allow1320NoNo
18614421PROVIDING OUTCOME EXPLANATION FOR ALGORITHMIC DECISIONSMarch 2024June 2025Allow1410YesNo
18588839DATABASE REDACTION FOR SEMI-STRUCTURED AND UNSTRUCTURED DATAFebruary 2024January 2025Allow1110YesNo
18408563UNIFIED PROGRAMMING ENVIRONMENT FOR PROGRAMMABLE DEVICESJanuary 2024April 2025Abandon1510NoNo
18544391DATABASE LOG ANALYZER IN A CLOUD ENVIRONMENT USING MICROSERVICE ORCHESTRATIONDecember 2023September 2024Allow900YesNo
18529702SYSTEM AND METHOD FOR DIFFERENTIAL MALWARE SCANNERDecember 2023December 2024Allow1210YesNo
18524999STATIC ANALYSIS CORRELATION SCANNERSNovember 2023June 2025Allow1900YesNo
18504502MEDIA STREAMINGNovember 2023October 2024Allow1110NoNo
18503930SECURE COPY-PASTE METHOD AND SYSTEMNovember 2023January 2024Allow200YesNo
18497205IDENTITY RESOLUTION AND DATA ENRICHMENT APPLICATION FRAMEWORKOctober 2023October 2024Allow1110NoNo
18481072FILE SCANNER TO DETECT MALICIOUS ELECTRONIC FILESOctober 2023October 2024Allow1210YesNo
18478478PACKET CLASSIFICATION FOR NETWORK ROUTINGSeptember 2023September 2024Allow1110YesNo
18468341BIOMETRIC AUTHENTICATION METHOD CAPABLE OF SECURELY MANAGING TEMPLATE PIECES OF BIOMETRIC INFORMATION WITH ENCRYPTIONSeptember 2023April 2025Allow1900YesNo
18239527DATABASE REDACTION FOR SEMI-STRUCTURED AND UNSTRUCTURED DATAAugust 2023January 2024Allow510YesNo
18453673END-TO-END TCP MONITORING DURING APPLICATION MIGRATIONAugust 2023May 2025Allow2000YesNo
18364939Authorization Decisions Using Conditioned Permissions for Resource CollectionsAugust 2023April 2025Allow2000YesNo
18228546IMPLEMENTING INHERITED GRANTS USING SECURE SCHEMASJuly 2023August 2024Allow1310YesNo
18227818GRANT INHERITANCE IN RBACJuly 2023July 2024Allow1220YesNo
18223523IMAGE PROCESSING APPARATUS AND VIRUS CHECK METHOD FOR THE SAMEJuly 2023June 2025Allow2300YesNo
18272094FALSIFICATION DETECTION DEVICE, FALSIFICATION DETECTION METHOD, AND FALSIFICATION DETECTION PROGRAMJuly 2023May 2025Allow2210YesNo
18220882RANSOMWARE SAFE FILESYSTEM (RSFS)July 2023April 2025Allow2100NoNo
18347467SENSOR-BASED HUMAN AUTHORIZATION EVALUATIONJuly 2023July 2024Allow1210YesNo
18256778Management method for authenticating a user of a device on an equipment item by passwordJune 2023July 2025Allow2510YesNo
18207656CLOUD ENVIRONMENT DATABASE LOG ANALYZER WITH RISK SIGNATURE DETECTIONJune 2023September 2023Allow300YesNo
18324500COMPUTER-BASED SYSTEMS CONFIGURED FOR ONE-TIME PASSCODE (OTP) PROTECTION AND METHODS OF USE THEREOFMay 2023January 2024Allow700YesNo
18323607AUGMENTED SECURITY RECOGNITION TASKSMay 2023December 2024Allow1810YesNo
18321974IDENTITY RESOLUTION AND DATA ENRICHMENT APPLICATION FRAMEWORKMay 2023August 2023Allow300YesNo
18143332SECRET ZERO GENERATION AND USAGEMay 2023March 2025Allow2200YesNo
18139635SECURE IN-MEMORY DATABASE IN CONTAINERApril 2023February 2024Allow1010NoNo
18306877ATTACK MITIGATION IN A PACKET-SWITCHED NETWORKApril 2023March 2024Allow1110YesNo
18304063DATABASE REDACTION FOR SEMI-STRUCTURED AND UNSTRUCTURED DATAApril 2023August 2023Allow400YesNo
18301366Real-time shellcode detection and preventionApril 2023March 2025Allow2310YesNo
18194624RANSOMWARE DETECTION VIA MONITORING OPEN FILE OR PROCESSApril 2023June 2025Allow2710YesNo
18118699DETECTING SUSPECTED MALWARE IN OPEN-SOURCE DEPENDENCIESMarch 2023January 2025Allow2300YesNo
18115647QUERY MANAGEMENT IN A STREAMING SYSTEMFebruary 2023January 2025Allow2300YesNo
18172614PARALLEL AND INCREMENTAL PROCESSING TECHNIQUES FOR DATA PROTECTIONFebruary 2023May 2023Allow300NoNo
18168852APPLICATION TRUST FRAMEWORKFebruary 2023January 2024Allow1120NoNo
18166595INITIATING PROVISIONING OF AN EXISTING ACCOUNT BASED ON AN UNAUTHENTICATED REQUESTFebruary 2023February 2024Allow1210NoNo
18162645FILE ANALYSIS ENGINES FOR IDENTIFYING SECURITY-RELATED THREATSJanuary 2023April 2025Allow2610YesNo
18162696IDENTITY RESOLUTION AND DATA ENRICHMENT APPLICATION FRAMEWORK USING SHARED DATA OBJECTSJanuary 2023April 2023Allow300YesNo
18158668SOCKET TRANSFERRING FOR HPC NETWORKS USING KERNEL TRACINGJanuary 2023November 2023Allow1010YesNo
18097740Network Threat PreventionJanuary 2023April 2024Allow1520NoNo
18154764ADDITIONAL SECURITY WITH WRAPPED PROGRAM INCLUDING PAYLOAD AND ADMINISTRATIVE CREDENTIALJanuary 2023November 2023Allow1000YesNo
18089474APPARATUS AND METHODS FOR AN APPLICATION PROGRAMMING INTERFACE TO DETECT AND LOCATE MALWARE IN MEMORYDecember 2022October 2024Allow2200YesNo
18060547SYSTEM AND METHOD FOR DEVICE-SPECIFIC CRYPTOGRAPHIC KEYNovember 2022October 2024Allow2200YesNo
18071875System, Method, and Apparatus for Authenticating a User DeviceNovember 2022July 2023Allow800YesNo
17991275SYSTEM AND METHOD FOR DIFFERENTIAL MALWARE SCANNERNovember 2022October 2023Allow1010YesNo
17986821EFFICIENT MANAGEMENT OF COMPLEX ATTACK SURFACESNovember 2022October 2024Allow2300YesNo
17979004Advanced ransomware detectionNovember 2022February 2025Allow2740NoNo
17922103Method and Apparatus for Controlling Mobile Storage Device, and Computer-Readable MediumOctober 2022September 2023Allow1010YesNo
18049092SYSTEMS AND METHODS FOR EXTERNAL ACCOUNT AUTHENTICATIONOctober 2022June 2025Allow3210YesNo
17963506TECHNIQUES TO AUTOMATICALLY UPDATE PAYMENT INFORMATION IN A COMPUTE ENVIRONMENTOctober 2022August 2024Allow2320NoNo
17917083Meta-Estimation of Bloom Filters with Vectors of CountsOctober 2022September 2024Allow2410YesNo
17953195TIME BASED TRIGGERING OF DYNAMIC TEMPLATESSeptember 2022August 2023Allow1110NoNo
17947973SENSOR-BASED HUMAN AUTHORIZATION EVALUATIONSeptember 2022April 2023Allow700YesNo
17942921INDICATION OF DIGITAL MEDIAL INTEGRITYSeptember 2022June 2025Allow3310NoNo
17902220ELECTRONIC APPARATUS AND SECURITY PROTECTION METHODSeptember 2022November 2024Allow2710NoNo
17822928MALWARE IDENTIFICATION AND PROFILINGAugust 2022March 2025Abandon3120NoNo
17888408DIGITAL CERTIFICATION SYSTEMAugust 2022December 2023Abandon1610NoNo
17813892USER-CENTRIC CLASSIFICATIONS FOR CRYPTOGRAPHIC TOKEN SETSJuly 2022July 2024Allow2400YesNo
17812698SYSTEMS AND METHODS FOR SELECTIVELY INDEXING BLOCKCHAIN OPERATIONS BASED ON IDENTIFYING UNINDEXED PARAMETERSJuly 2022April 2024Allow2100YesNo
17864502SYSTEM AND METHOD FOR SECURING DIAGNOSTIC DATA COLLECTION USING DUAL ENCRYPTIONJuly 2022January 2025Allow3010NoNo
17810237TIME-BASED LEADERBOARD DISPLAY ON SOCIAL MEDIA NETWORKJune 2022October 2023Allow1500YesNo
17855764INTERNET PROTOCOL BASED SECURITY OVER PORT FORWARDING TUNNELSJune 2022May 2025Allow3510YesNo
17851223UNIFIED PROGRAMMING ENVIRONMENT FOR PROGRAMMABLE DEVICESJune 2022August 2023Allow1410YesNo
17808777AUTHORIZING SECURE CONNECTIONS RESPONSIVE TO CERTIFICATES BOUND TO LOGICAL IDENTIFIERSJune 2022November 2024Allow2900YesNo
17844656CLASSIFICATION OF DATA FILESJune 2022October 2022Allow400YesNo
17843062MALWARE DETECTION USING FEDERATED LEARNINGJune 2022October 2022Allow400YesNo
17843318MALWARE DETECTION USING FEDERATED LEARNINGJune 2022June 2023Allow1210NoNo
17843323MALWARE DETECTION USING FEDERATED LEARNINGJune 2022May 2023Allow1110NoNo
17843304MALWARE DETECTION USING FEDERATED LEARNINGJune 2022March 2023Allow900YesNo
17842297EVENT BASED AUTHENTICATIONJune 2022July 2024Allow2510YesNo
17841483MEDIA STREAMINGJune 2022August 2023Allow1410YesNo
17839614PACKET CLASSIFICATION FOR NETWORK ROUTINGJune 2022August 2023Allow1410YesNo
17750955SYSTEM AND METHOD FOR ORGANIZATION AND CLASSIFICATION OF APPLICATION SECURITY VULNERABILITIESMay 2022November 2024Abandon3010NoNo
17777502DATA MANAGEMENT SYSTEMMay 2022September 2024Allow2800YesNo
17728579CLUSTERED VIRTUAL TRUSTED PLATFORM MODULE DOMAIN SERVICES SYSTEMApril 2022January 2025Allow3310YesNo
17721757APPARATUS FOR PROCESSING CYBER THREAT INFORMATION, METHOD FOR PROCESSING CYBER THREAT INFORMATION, AND MEDIUM FOR STORING A PROGRAM PROCESSING CYBER THREAT INFORMATIONApril 2022August 2024Allow2810NoNo
17714261PREVENTING PHISHING ATTEMPTS OF ONE-TIME PASSWORDSApril 2022May 2025Abandon3801NoNo
17710264SMART VERIFICATION OF AUTHENTICATION FOR USER LOG INS BASED ON RISK LEVELSMarch 2022March 2025Allow3511YesNo
17656876Optimal antimalware signatures databaseMarch 2022December 2024Allow3210YesNo
17704064Systems and Methods for Deriving Application Security Signals from Application Performance DataMarch 2022January 2025Allow3320YesNo
17655786WEB INTEGRATION, TIMING, ACCESS, AND DISTRIBUTION CONTROLMarch 2022June 2024Allow2600YesNo
17654978HASH SUBTREES FOR GROUPING COMPONENTS BY COMPONENT TYPEMarch 2022June 2024Allow2700YesNo
17652285Fast antimalware scanFebruary 2022April 2024Allow2600YesNo
17680160METHOD, SYSTEM, APPARATUS AND DEVICE FOR DATA EXCHANGEFebruary 2022May 2022Allow200YesNo
17676785AUTHENTICATION SYSTEM WITH AN AUTOMATIC AUTHENTICATION MECHANISM AND AUTOMATIC AUTHENTICATION METHODFebruary 2022April 2024Allow2500YesNo
17651755TIME-BASED LEADERBOARD DISPLAY ON SOCIAL MEDIA NETWORKFebruary 2022June 2022Allow400YesNo
17591409MITIGATING MALWARE IMPACT BY UTILIZING SANDBOX INSIGHTSFebruary 2022October 2023Allow2020YesYes
17649423AUTHENTICATION BASED ON CHAIN OF STRINGS GENERATED FROM SECRET STRINGJanuary 2022January 2024Allow2400YesNo
17589863PHYSIMETRIC-BASED DATA SECURITY FOR CODED DISTRIBUTED TEMPERATURE SENSINGJanuary 2022June 2024Abandon2910NoNo
17585442METHOD AND APPARATUS FOR CONTROL OF DATA ACCESSJanuary 2022January 2023Allow1220YesNo
17580694SECURING SOFTWARE ROUTINESJanuary 2022June 2023Allow1600NoNo
17575033SYSTEM AND METHOD FOR DIFFERENTIAL MALWARE SCANNERJanuary 2022July 2022Allow610YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner JHAVERI, JAYESH M.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
5
Examiner Affirmed
3
(60.0%)
Examiner Reversed
2
(40.0%)
Reversal Percentile
60.9%
Higher than average

What This Means

With a 40.0% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
11
Allowed After Appeal Filing
6
(54.5%)
Not Allowed After Appeal Filing
5
(45.5%)
Filing Benefit Percentile
84.8%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 54.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner JHAVERI, JAYESH M - Prosecution Strategy Guide

Executive Summary

Examiner JHAVERI, JAYESH M works in Art Unit 2433 and has examined 660 patent applications in our dataset. With an allowance rate of 86.7%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 26 months.

Allowance Patterns

Examiner JHAVERI, JAYESH M's allowance rate of 86.7% places them in the 60% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by JHAVERI, JAYESH M receive 1.30 office actions before reaching final disposition. This places the examiner in the 25% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by JHAVERI, JAYESH M is 26 months. This places the examiner in the 60% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +32.5% benefit to allowance rate for applications examined by JHAVERI, JAYESH M. This interview benefit is in the 83% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 37.3% of applications are subsequently allowed. This success rate is in the 82% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 46.2% of cases where such amendments are filed. This entry rate is in the 65% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 6% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 61.5% of appeals filed. This is in the 34% percentile among all examiners. Of these withdrawals, 50.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 21.2% are granted (fully or in part). This grant rate is in the 12% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.6% of allowed cases (in the 62% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.7% of allowed cases (in the 52% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • RCEs are effective: This examiner has a high allowance rate after RCE compared to others. If you receive a final rejection and have substantive amendments or arguments, an RCE is likely to be successful.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.