Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19269404 | Deriving Input Restrictions for Artificial Intelligence Agents | July 2025 | October 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 19269354 | Deriving Input Restrictions for Artificial Intelligence Agents | July 2025 | October 2025 | Allow | 3 | 1 | 0 | Yes | No |
| 19269462 | Deriving Input Restrictions for Artificial Intelligence Agents | July 2025 | March 2026 | Allow | 8 | 0 | 0 | Yes | No |
| 19269215 | Management of Connector Services and Connected Artificial Intelligence Agents for Message Senders | July 2025 | September 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19234232 | Automated Tool Discovery and Ingestion for Artificial Intelligence Agents | June 2025 | August 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19170041 | Systems and Methods for a Hierarchical Record-Level Security Architecture | April 2025 | July 2025 | Allow | 4 | 0 | 0 | Yes | No |
| 19067812 | Management of Connector Services and Connected Artificial Intelligence Agents for Message Senders | February 2025 | May 2025 | Allow | 2 | 0 | 0 | No | No |
| 19034984 | METHODS AND SYSTEMS FOR ENHANCING DETECTION OF FRAUDULENT AUTHENTICATION DATA | January 2025 | June 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18978819 | SYSTEM AND METHOD FOR DEVICE-SPECIFIC CRYPTOGRAPHIC KEY | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18962991 | PROVIDING ACCESS TO COMPOSITE AI-GENERATED DATA | November 2024 | July 2025 | Allow | 8 | 1 | 0 | No | No |
| 18948343 | Agent Functionality Extensions Using Surveyors | November 2024 | March 2025 | Allow | 4 | 1 | 0 | Yes | No |
| 18946880 | DERIVING INPUT RESTRICTIONS FOR ARTIFICIAL INTELLIGENCE AGENTS | November 2024 | May 2025 | Allow | 6 | 1 | 0 | No | No |
| 18923367 | EVENT BASED AUTHENTICATION | October 2024 | February 2026 | Allow | 16 | 0 | 0 | No | No |
| 18922304 | SIGNAL PROTECTION AND RETRIEVAL BY NON-LINEAR ANALOG MODULATION | October 2024 | March 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18886003 | SYSTEMS AND METHODS FOR PROVIDING PRIORITY FOR USER EQUIPMENT | September 2024 | January 2026 | Allow | 16 | 0 | 0 | Yes | No |
| 18886124 | System and method to detect boot kit attacks | September 2024 | December 2025 | Allow | 15 | 0 | 0 | No | No |
| 18795878 | SYSTEM AND METHOD FOR MODELLING A CYBER-PHYSICAL SYSTEM TO ACT AS A HONEYPOT FOR CYBERATTACKS | August 2024 | February 2025 | Allow | 6 | 1 | 0 | No | No |
| 18761930 | GENERATION AND USE OF PSEUDO-MALWARE FOR BLACK BOX TESTING OF CYBERSECURITY SYSTEMS | July 2024 | November 2025 | Allow | 17 | 0 | 0 | No | No |
| 18670086 | TRANSFORMED ONE TIME PASSWORD (OTP) FOR AUTHENTICATION | May 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18650636 | APPLICATION TRUST FRAMEWORK | April 2024 | February 2025 | Allow | 10 | 1 | 0 | No | No |
| 18645226 | VISIBLE LIGHT COMMUNICATION (VLC) BASED MULTI-FACTOR AUTHENTICATION (MFA) MECHANISM FOR EDGE DEVICES | April 2024 | October 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18643940 | VIRTUALIZED CONTROLLERS FOR IN-VEHICLE AND IOT NETWORKS | April 2024 | May 2025 | Abandon | 13 | 1 | 0 | No | No |
| 18621838 | SIGNAL PROTECTION AND RETRIEVAL BY NON-LINEAR ANALOG MODULATION | March 2024 | June 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18617299 | PRESERVING WEB PAGE FUNCTIONALITY THROUGH DYNAMIC ANALYSIS OF HOST WEB PAGES | March 2024 | April 2025 | Allow | 13 | 2 | 0 | No | No |
| 18614421 | PROVIDING OUTCOME EXPLANATION FOR ALGORITHMIC DECISIONS | March 2024 | June 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18600391 | Ensemble Intrusion Detection System for IoT Platforms | March 2024 | July 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18588839 | DATABASE REDACTION FOR SEMI-STRUCTURED AND UNSTRUCTURED DATA | February 2024 | January 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18585443 | DATA TRANSMISSION METHOD AND APPARATUS THEREOF | February 2024 | August 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18408563 | UNIFIED PROGRAMMING ENVIRONMENT FOR PROGRAMMABLE DEVICES | January 2024 | April 2025 | Abandon | 15 | 1 | 0 | No | No |
| 18404190 | SECURED DIRECT ACCESS FOR CUSTOMER SERVICE | January 2024 | November 2025 | Allow | 22 | 0 | 0 | No | No |
| 18573441 | DATA MANAGEMENT SYSTEM | December 2023 | February 2026 | Abandon | 25 | 1 | 0 | No | No |
| 18544391 | DATABASE LOG ANALYZER IN A CLOUD ENVIRONMENT USING MICROSERVICE ORCHESTRATION | December 2023 | September 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18529702 | SYSTEM AND METHOD FOR DIFFERENTIAL MALWARE SCANNER | December 2023 | December 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18524999 | STATIC ANALYSIS CORRELATION SCANNERS | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18522449 | SYSTEM AND METHOD FOR PREVENTING AND MITIGATING MALICIOUS PROCESSES BY ANALYZING LIVE DATA | November 2023 | January 2026 | Allow | 25 | 1 | 0 | No | No |
| 18512670 | Host Level Data Analytics for Cyberattack Detection | November 2023 | October 2025 | Allow | 23 | 1 | 0 | No | No |
| 18504502 | MEDIA STREAMING | November 2023 | October 2024 | Allow | 11 | 1 | 0 | No | No |
| 18503930 | SECURE COPY-PASTE METHOD AND SYSTEM | November 2023 | January 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18497205 | IDENTITY RESOLUTION AND DATA ENRICHMENT APPLICATION FRAMEWORK | October 2023 | October 2024 | Allow | 11 | 1 | 0 | No | No |
| 18481072 | FILE SCANNER TO DETECT MALICIOUS ELECTRONIC FILES | October 2023 | October 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18478478 | PACKET CLASSIFICATION FOR NETWORK ROUTING | September 2023 | September 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18372735 | PROCESSING SYSTEM, PROCESSING METHOD, AND PROCESSING PROGRAM | September 2023 | September 2025 | Allow | 24 | 1 | 0 | No | No |
| 18468341 | BIOMETRIC AUTHENTICATION METHOD CAPABLE OF SECURELY MANAGING TEMPLATE PIECES OF BIOMETRIC INFORMATION WITH ENCRYPTION | September 2023 | April 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18244452 | WEB BROWSER-BASED SECURE EQUIPMENT ACCESS | September 2023 | December 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18461780 | PROCESSOR AND OPERATING METHOD FOR A HOMOGENEOUS DUAL COMPUTING SYSTEM | September 2023 | January 2026 | Allow | 29 | 2 | 0 | No | No |
| 18239527 | DATABASE REDACTION FOR SEMI-STRUCTURED AND UNSTRUCTURED DATA | August 2023 | January 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18453673 | END-TO-END TCP MONITORING DURING APPLICATION MIGRATION | August 2023 | May 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18364939 | Authorization Decisions Using Conditioned Permissions for Resource Collections | August 2023 | April 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18228833 | VEHICLE CONTROL SYSTEM AND VEHICLE CONTROL METHOD | August 2023 | August 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18228546 | IMPLEMENTING INHERITED GRANTS USING SECURE SCHEMAS | July 2023 | August 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18227818 | GRANT INHERITANCE IN RBAC | July 2023 | July 2024 | Allow | 12 | 2 | 0 | Yes | No |
| 18223523 | IMAGE PROCESSING APPARATUS AND VIRUS CHECK METHOD FOR THE SAME | July 2023 | June 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18272802 | GENERATION DEVICE, GENERATION METHOD, AND GENERATION PROGRAM | July 2023 | July 2025 | Allow | 24 | 1 | 0 | No | No |
| 18272094 | FALSIFICATION DETECTION DEVICE, FALSIFICATION DETECTION METHOD, AND FALSIFICATION DETECTION PROGRAM | July 2023 | May 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18220882 | RANSOMWARE SAFE FILESYSTEM (RSFS) | July 2023 | April 2025 | Allow | 21 | 0 | 0 | No | No |
| 18347467 | SENSOR-BASED HUMAN AUTHORIZATION EVALUATION | July 2023 | July 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18213627 | DETECTING MALWARE ACTIVITY USING KERNEL-BASED PROCESS DISCOVERY DETECTION | June 2023 | December 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 18256778 | Management method for authenticating a user of a device on an equipment item by password | June 2023 | July 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18207656 | CLOUD ENVIRONMENT DATABASE LOG ANALYZER WITH RISK SIGNATURE DETECTION | June 2023 | September 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 18324500 | COMPUTER-BASED SYSTEMS CONFIGURED FOR ONE-TIME PASSCODE (OTP) PROTECTION AND METHODS OF USE THEREOF | May 2023 | January 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18323607 | AUGMENTED SECURITY RECOGNITION TASKS | May 2023 | December 2024 | Allow | 18 | 1 | 0 | Yes | No |
| 18321974 | IDENTITY RESOLUTION AND DATA ENRICHMENT APPLICATION FRAMEWORK | May 2023 | August 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 18143332 | SECRET ZERO GENERATION AND USAGE | May 2023 | March 2025 | Allow | 22 | 0 | 0 | Yes | No |
| 18141093 | MALICIOUS PATTERN EXTRACTION VIA FUZZING | April 2023 | October 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 18139635 | SECURE IN-MEMORY DATABASE IN CONTAINER | April 2023 | February 2024 | Allow | 10 | 1 | 0 | No | No |
| 18306877 | ATTACK MITIGATION IN A PACKET-SWITCHED NETWORK | April 2023 | March 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18137548 | METHOD AND APPARATUS FOR MANAGING MULTIMEDIA FILE RELATED TO DOCUMENT | April 2023 | December 2025 | Abandon | 32 | 0 | 1 | No | No |
| 18304063 | DATABASE REDACTION FOR SEMI-STRUCTURED AND UNSTRUCTURED DATA | April 2023 | August 2023 | Allow | 4 | 0 | 0 | Yes | No |
| 18301366 | Real-time shellcode detection and prevention | April 2023 | March 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18295027 | MALWARE DETECTION VIA TRACING CALLS RATE TO OBTAIN FILE ATTRIBUTES | April 2023 | March 2026 | Allow | 35 | 2 | 0 | Yes | No |
| 18194624 | RANSOMWARE DETECTION VIA MONITORING OPEN FILE OR PROCESS | April 2023 | June 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18118699 | DETECTING SUSPECTED MALWARE IN OPEN-SOURCE DEPENDENCIES | March 2023 | January 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18115647 | QUERY MANAGEMENT IN A STREAMING SYSTEM | February 2023 | January 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18172614 | PARALLEL AND INCREMENTAL PROCESSING TECHNIQUES FOR DATA PROTECTION | February 2023 | May 2023 | Allow | 3 | 0 | 0 | No | No |
| 18168852 | APPLICATION TRUST FRAMEWORK | February 2023 | January 2024 | Allow | 11 | 2 | 0 | No | No |
| 18166595 | INITIATING PROVISIONING OF AN EXISTING ACCOUNT BASED ON AN UNAUTHENTICATED REQUEST | February 2023 | February 2024 | Allow | 12 | 1 | 0 | No | No |
| 18162645 | FILE ANALYSIS ENGINES FOR IDENTIFYING SECURITY-RELATED THREATS | January 2023 | April 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18162696 | IDENTITY RESOLUTION AND DATA ENRICHMENT APPLICATION FRAMEWORK USING SHARED DATA OBJECTS | January 2023 | April 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 18158668 | SOCKET TRANSFERRING FOR HPC NETWORKS USING KERNEL TRACING | January 2023 | November 2023 | Allow | 10 | 1 | 0 | Yes | No |
| 18097740 | Network Threat Prevention | January 2023 | April 2024 | Allow | 15 | 2 | 0 | No | No |
| 18154764 | ADDITIONAL SECURITY WITH WRAPPED PROGRAM INCLUDING PAYLOAD AND ADMINISTRATIVE CREDENTIAL | January 2023 | November 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 18149843 | SYSTEM AND METHODS FOR SMART FLUID TRANSFER REGISTER APPLICATIONS | January 2023 | January 2026 | Allow | 36 | 1 | 0 | Yes | No |
| 18089474 | APPARATUS AND METHODS FOR AN APPLICATION PROGRAMMING INTERFACE TO DETECT AND LOCATE MALWARE IN MEMORY | December 2022 | October 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 18083102 | METHOD AND SYSTEM FOR INCREMENTAL CENTROID CLUSTERING | December 2022 | August 2025 | Allow | 32 | 1 | 0 | Yes | No |
| 18063372 | SHAPE OVERLAY FOR PROOF OF LIVENESS | December 2022 | March 2025 | Allow | 27 | 1 | 0 | No | No |
| 18071875 | System, Method, and Apparatus for Authenticating a User Device | November 2022 | July 2023 | Allow | 8 | 0 | 0 | Yes | No |
| 18060547 | SYSTEM AND METHOD FOR DEVICE-SPECIFIC CRYPTOGRAPHIC KEY | November 2022 | October 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17991275 | SYSTEM AND METHOD FOR DIFFERENTIAL MALWARE SCANNER | November 2022 | October 2023 | Allow | 10 | 1 | 0 | Yes | No |
| 17986821 | EFFICIENT MANAGEMENT OF COMPLEX ATTACK SURFACES | November 2022 | October 2024 | Allow | 23 | 0 | 0 | Yes | No |
| 18054143 | SOCIAL MEDIA NETWORK INTERFACE FEATURES CONNECTED TO CRYPTOGRAPHIC LEDGER | November 2022 | October 2025 | Abandon | 35 | 1 | 0 | No | No |
| 17980781 | SYSTEM, METHOD AND ARCHITECTURE FOR SECURE SHARING OF CUSTOMER INTELLIGENCE | November 2022 | July 2025 | Allow | 32 | 1 | 0 | No | No |
| 17979004 | Advanced ransomware detection | November 2022 | February 2025 | Allow | 27 | 4 | 0 | No | No |
| 17922103 | Method and Apparatus for Controlling Mobile Storage Device, and Computer-Readable Medium | October 2022 | September 2023 | Allow | 10 | 1 | 0 | Yes | No |
| 18049092 | SYSTEMS AND METHODS FOR EXTERNAL ACCOUNT AUTHENTICATION | October 2022 | June 2025 | Allow | 32 | 1 | 0 | Yes | No |
| 17963506 | TECHNIQUES TO AUTOMATICALLY UPDATE PAYMENT INFORMATION IN A COMPUTE ENVIRONMENT | October 2022 | August 2024 | Allow | 23 | 2 | 0 | No | No |
| 17917083 | Meta-Estimation of Bloom Filters with Vectors of Counts | October 2022 | September 2024 | Allow | 24 | 1 | 0 | Yes | No |
| 17953195 | TIME BASED TRIGGERING OF DYNAMIC TEMPLATES | September 2022 | August 2023 | Allow | 11 | 1 | 0 | No | No |
| 17947973 | SENSOR-BASED HUMAN AUTHORIZATION EVALUATION | September 2022 | April 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 17942921 | INDICATION OF DIGITAL MEDIAL INTEGRITY | September 2022 | June 2025 | Allow | 33 | 1 | 0 | No | No |
| 17902220 | ELECTRONIC APPARATUS AND SECURITY PROTECTION METHOD | September 2022 | November 2024 | Allow | 27 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner JHAVERI, JAYESH M.
With a 40.0% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 60.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner JHAVERI, JAYESH M works in Art Unit 2433 and has examined 569 patent applications in our dataset. With an allowance rate of 85.4%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 27 months.
Examiner JHAVERI, JAYESH M's allowance rate of 85.4% places them in the 62% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by JHAVERI, JAYESH M receive 1.40 office actions before reaching final disposition. This places the examiner in the 22% percentile for office actions issued. This examiner issues significantly fewer office actions than most examiners.
The median time to disposition (half-life) for applications examined by JHAVERI, JAYESH M is 27 months. This places the examiner in the 72% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +33.7% benefit to allowance rate for applications examined by JHAVERI, JAYESH M. This interview benefit is in the 82% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 36.8% of applications are subsequently allowed. This success rate is in the 84% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 47.1% of cases where such amendments are filed. This entry rate is in the 71% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 7% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 58.3% of appeals filed. This is in the 32% percentile among all examiners. Of these withdrawals, 42.9% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 21.4% are granted (fully or in part). This grant rate is in the 11% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.7% of allowed cases (in the 64% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.