USPTO Examiner NIPA WASIKA - Art Unit 2433

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18602353PROTECTING SERVERLESS APPLICATIONSMarch 2024February 2025Allow1100YesNo
18397610SYSTEMS AND METHODS TO DETECT GPS SPOOFING ATTACKSDecember 2023June 2025Allow1800YesNo
18529586FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALSDecember 2023January 2025Allow1300YesNo
18519789RANSOMWARE PROTECTION IN ADVANCED INJECTION-BASED ATTACKSNovember 2023May 2025Allow1800YesNo
18485732SYSTEMS AND METHODS FOR ENHANCED REMOTE CONNECTIVITY PROVISIONINGOctober 2023March 2025Allow1700YesNo
18374055GAMIFICATION OF TRAINING FOR PHISHING PREVENTION IN METAVERSESeptember 2023May 2025Allow1900YesNo
18447357SYSTEMS AND METHODS FOR RETRIEVING DATA USING A BROWSER INSTANCEAugust 2023June 2025Allow2300YesNo
18345086DETECTION OF MALICIOUS PHISHING EMAILSJune 2023March 2025Allow2100YesNo
18259450MULTIWORKFLOW AUTHORIZATION SYSTEM AND METHODJune 2023June 2025Allow2410YesNo
18197549AUTHENTICATION BASED ON USER INTERACTION WITH IMAGES OR OBJECTSMay 2023December 2024Allow1900YesNo
18314023SECURING CONTROL AND USER PLANE SEPARATION IN MOBILE NETWORKSMay 2023November 2024Allow1800YesNo
18307635AUTOMATED MACHINE LEARNING ACCESS RIGHTS ENGINEApril 2023March 2025Allow2200YesNo
18146658DYNAMICALLY SCALABLE APPLICATION FIREWALL DEPLOYMENT FOR CLOUD NATIVE APPLICATIONSDecember 2022February 2025Allow2600YesNo
18145381Systems and Methods for Tracking and Identifying Phishing Website AuthorsDecember 2022September 2024Allow2100YesNo
18061344ANOMALY AND RANSOMWARE DETECTIONDecember 2022April 2025Allow2810YesNo
17870635EDGE-BASED ENTERPRISE NETWORK SECURITY APPLIANCE AND SYSTEMJuly 2022April 2023Allow910YesNo
17842428Network Profile Anti-spoofing On Wireless GatewaysJune 2022October 2022Allow400YesNo
17715610FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALSApril 2022September 2023Allow1700YesNo
17711472SYSTEM AND METHODS FOR SPOOFED DOMAIN IDENTIFICATION AND USER TRAININGApril 2022October 2023Allow1800YesNo
17652679MANAGING CREDENTIALS OF MULTIPLE USERS ON AN ELECTRONIC DEVICEFebruary 2022April 2025Allow3710YesNo
17614334METHOD FOR PREVENTING DIFFERENTIAL CRYPTANALYSIS ATTACKNovember 2021September 2022Allow1000YesNo
17381641WORKSPACE-BASED FIXED PASS-THROUGH MONITORING SYSTEM AND METHOD FOR HARDWARE DEVICES USING A BASEBOARD MANAGEMENT CONTROLLER (BMC)July 2021May 2025Allow4620YesNo
17419002Method for detecting that a secure element has been temporarily disconnected from a device, and corresponding deviceJune 2021January 2025Allow4320YesNo
17240587AUTHENTICATION BASED ON USER INTERACTION WITH IMAGES OR OBJECTSApril 2021February 2023Allow2210YesNo
17233978MULTI-DEVICE DIGITAL RIGHTS MANAGEMENT SYSTEMApril 2021August 2022Allow1500YesNo
17223949SYSTEM, METHOD, AND COMPUTER PROGRAM FOR AN UNATTENDED TRAP FOR A NETWORK BRUTE FORCE ATTACKApril 2021November 2024Allow4340YesYes
17213199CYBERSECURITY INCIDENT DETECTION SYSTEMS AND TECHNIQUESMarch 2021December 2024Abandon4510NoNo
17212265SYSTEM AND METHOD FOR ROGUE DEVICE DETECTIONMarch 2021September 2024Allow4220YesNo
17197807Decrypting Secure Packages In A Storage NetworkMarch 2021April 2023Allow2520YesNo
17164835Method for Securing OpenRAN InterfacesFebruary 2021October 2024Abandon4530NoNo
17161491IMPERSONATING REQUEST-BASED SECURITY IN CONNECTION-BASED SECURITY ENVIRONMENTJanuary 2021April 2024Allow3800NoNo
17147062INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND RECORDING MEDIUMJanuary 2021February 2024Abandon3720YesNo
17139103DYNAMICALLY SCALABLE APPLICATION FIREWALL DEPLOYMENT FOR CLOUD NATIVE APPLICATIONSDecember 2020October 2022Allow2210YesNo
17118112Systems and Methods for Tracking and Identifying Phishing Website AuthorsDecember 2020September 2022Allow2100YesNo
17057151Message Transmission between Core Network DomainsNovember 2020March 2025Allow5130YesNo
17095385MALWARE DETONATIONNovember 2020April 2023Abandon2920YesNo
17078063WIRELESS NETWORK VERIFICATION USING FINGERPRINTSOctober 2020December 2024Allow5020YesNo
17069869CONTEXT-AWARE NETWORK POLICY ENFORCEMENTOctober 2020June 2025Abandon5630YesNo
17070855ELECTRONIC CIRCUIT IDENTIFICATION (ID) TECHNIQUES USING BOTH A CLIENT-SIDE ID AND A SUPPLIER-SIDE IDOctober 2020February 2023Allow2810YesNo
16995783SYSTEMS AND METHODS FOR PROTECTION FROM PHISHING ATTACKSAugust 2020August 2021Abandon1211NoNo
16917490SECURING CONTROL AND USER PLANE SEPARATION IN MOBILE NETWORKSJune 2020February 2023Allow3120YesNo
16893023FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALSJune 2020February 2022Allow2110YesNo
16889327AUTHENTICATION USING A FEEDER ROBOT IN A WEB ENVIRONMENTJune 2020January 2022Allow2000YesNo
16887650UTILIZING WEB APPLICATION FIREWALL AND MACHINE LEARNING TO DETECT COMMAND AND CONTROLMay 2020August 2022Allow2610YesNo
16877614Blockchain Recordation of Device UsageMay 2020May 2021Allow1200YesNo
16877194METHODS AND SYSTEMS FOR DETECTING MALICIOUS SERVERSMay 2020December 2021Allow1900YesNo
16874421CREATING DIGITAL TWINS AT SCALEMay 2020July 2022Allow2600YesNo
16866619METHOD FOR THE EXECUTION OF A BINARY CODE OF A SECURE FUNCTION BY A MICROPROCESSORMay 2020January 2022Allow2110YesNo
16865952SYSTEM AND METHODS FOR SPOOFED DOMAIN IDENTIFICATION AND USER TRAININGMay 2020March 2022Allow2220YesNo
16859486METHOD, CONTROL TERMINAL AND SYSTEM FOR ACCESSING DEVICE TO NETWORKApril 2020February 2023Allow3310YesNo
16848012NETWORK APPLICATION FIREWALLApril 2020February 2023Allow3430NoNo
16841403STORAGE IN A NON-VOLATILE MEMORYApril 2020December 2020Allow900YesNo
16838163DEVICE AND METHOD FOR SECURE PRIVATE DATA AGGREGATIONApril 2020February 2023Allow3410YesNo
16836615SYSTEMS AND METHODS FOR INTEGRATING SYSTEMS OVER UNTRUSTED NETWORKSMarch 2020June 2021Allow1520YesNo
16836535SYSTEMS AND METHODS FOR INTEGRATING SYSTEMS OVER UNTRUSTED NETWORKSMarch 2020November 2021Allow1920YesNo
16836641SYSTEMS AND METHODS FOR INTEGRATING SYSTEMS OVER UNTRUSTED NETWORKSMarch 2020September 2021Allow1820YesNo
16652173METHOD AND SYSTEM FOR SECURE STORAGE OF DIGITAL DATAMarch 2020April 2022Allow2510NoNo
16649480Method And System For Multi-Party Unlock In An Inventory TransactionMarch 2020June 2025Allow6040YesNo
16823419METHOD FOR EXECUTING A BINARY CODE OF A FUNCTION SECURED BY A MICROPROCESSORMarch 2020May 2022Allow2610NoNo
16643891Re-Establishing a Connection Between a User Controller Device and a Wireless DeviceMarch 2020March 2025Allow6030YesNo
16792809MANAGING CREDENTIALS OF MULTIPLE USERS ON AN ELECTRONIC DEVICEFebruary 2020November 2021Allow2010YesNo
16785312METHOD AND APPARATUS FOR DATA TRANSMISSION IN A TEE SYSTEMFebruary 2020March 2020Allow100NoNo
16785403METHOD AND APPARATUS FOR MULTITHREADED DATA TRANSMISSION IN A TEE SYSTEMFebruary 2020May 2020Allow310NoNo
16733658TRIGGER IOT DEVICE AND FUNCTIONAL IOT DEVICE AND IOT SYSTEM ASSOCIATED THEREWITH AND METHOD FOR CONTROLLING THEREOFJanuary 2020November 2022Allow3410YesNo
16726459CONTROL METHOD FOR ELECTRONIC DEVICEDecember 2019August 2024Abandon5650YesNo
16722126IDENTIFYING EPHEMERAL COMPUTING ASSETS USING MACHINE LEARNINGDecember 2019September 2022Allow3210YesNo
16712712COMMUNICATIONS METHOD AND APPARATUS FOR SECURE COMMUNICATION WHEN A TERMINAL IS IN A RADIO RESOURCE CONTROL INACTIVE STATEDecember 2019October 2022Allow3410YesNo
16686888SYSTEMS AND METHODS FOR SECURING USER DOMAIN CREDENTIALS FROM PHISHING ATTACKSNovember 2019September 2022Allow3430YesNo
16685034ENABLING BOOSTING PROTOCOLS ON ENCRYPTED DATANovember 2019November 2024Allow6040YesNo
16680314Integrated Systems and Methods Providing Situational Awareness of Operations In An OrganizationNovember 2019December 2023Allow4930YesYes
16670568SYSTEM AND METHODS FOR PERFORMING DISTRIBUTED AUTHENTICATION USING A BRIDGE COMPUTER SYSTEMOctober 2019November 2021Allow2410YesNo
16670620SECURELY EXECUTING SMART CONTRACT OPERATIONS IN A TRUSTED EXECUTION ENVIRONMENTOctober 2019July 2020Allow810YesNo
16607207ESTABLISHING CONNECTIONS BETWEEN WIFI ACCESS POINTS AND WIRELESS DEVICES VIA LIGHT FIDELITY ACCESS POINTSOctober 2019June 2023Allow4420YesNo
16600280SYSTEMS AND METHODS FOR ENHANCED REMOTE CONNECTIVITY PROVISIONINGOctober 2019July 2023Allow4620YesNo
16571426DYNAMIC DIGITAL CONSENTSeptember 2019July 2020Allow910NoNo
16571409DYNAMIC DIGITAL CONSENTSeptember 2019May 2020Allow810NoNo
16572347DATA PROCESSING SYSTEMS AND METHODS FOR PERFORMING PRIVACY ASSESSMENTS AND MONITORING OF NEW VERSIONS OF COMPUTER CODE FOR PRIVACY COMPLIANCESeptember 2019November 2020Abandon1420NoNo
16491661SYSTEMS AND METHOD TO ADDRESS THE SECURITY VULNERABILITY IN WIRELESS NETWORKSSeptember 2019May 2022Allow3320YesNo
16563323DISTRIBUTED DATA STORAGE BY MEANS OF AUTHORISATION TOKENSeptember 2019June 2022Allow3440YesNo
16559442PERFORMING SCRAMBLING AND/OR DESCRAMBLING ON PARALLEL COMPUTING ARCHITECTURESSeptember 2019November 2023Abandon5020YesNo
16487482SECURE COMMUNICATION FOR COMMISSIONING AND DECOMMISSIONING CIRCUIT BREAKERS AND PANEL SYSTEMAugust 2019September 2024Allow6030YesNo
16485171ATTACK COUNTERMEASURE DETERMINATION APPARATUS, ATTACK COUNTERMEASURE DETERMINATION METHOD, AND ATTACK COUNTERMEASURE DETERMINATION PROGRAMAugust 2019February 2023Allow4230YesNo
16534447ANOMALY AND RANSOMWARE DETECTIONAugust 2019August 2022Allow3610YesNo
16482256CHARACTER STRING CLASSIFICATION METHOD AND SYSTEM, AND CHARACTER STRING CLASSIFICATION DEVICEJuly 2019June 2022Allow3410YesNo
16510578IDENTIFYING SPAM USING NEAR-DUPLICATE DETECTION FOR TEXT AND IMAGESJuly 2019February 2022Allow3200YesNo
16476406SECURITY ARCHITECTURE FOR MACHINE TYPE COMMUNICATIONSJuly 2019June 2022Abandon3520YesNo
16435831METHOD FOR SECURELY MAINTAINING AN ENCRYPTION KEYJune 2019January 2025Allow6020NoYes
16434412MANAGEMENT OF CRYPTOGRAPHICALLY SECURE EXCHANGES OF DATA USING PERMISSIONED DISTRIBUTED LEDGERSJune 2019June 2022Allow3730YesNo
16430382Network Profile Anti-Spoofing on Wireless GatewaysJune 2019March 2022Allow3310YesNo
16422715FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALSMay 2019April 2020Allow1110YesNo
16400654TRANSMITTING AND STORING DIFFERENT TYPES OF ENCRYPTED INFORMATION USING TCP URGENT MECHANISMMay 2019November 2022Allow4250YesNo
16392648INTRINSIC DATA GENERATION DEVICE, SEMICONDUCTOR DEVICE AND AUTHENTICATION SYSTEMApril 2019March 2024Allow5820YesNo
16366870METHOD FOR THE PERSONALIZATION OF INTEGRATED CIRCUIT CARDS, CORRESPONDING SYSTEM AND COMPUTER PROGRAM PRODUCTMarch 2019June 2022Allow3820YesNo
16351606SECRET SHARING VIA BLOCKCHAIN DISTRIBUTIONMarch 2019March 2020Allow1200NoNo
16064715METHOD AND APPARATUS FOR SUPPORTING SECURITY FOR CU-CP AND CU-UP SEPARATION IN WIRELESS COMMUNICATION SYSTEMMarch 2019November 2021Abandon4140NoNo
16263651APPARATUS AND METHOD BY WHICH USER DEVICE IN HOME NETWORK SYSTEM TRANSMITS HOME-DEVICE-RELATED INFORMATIONJanuary 2019July 2021Allow3010YesNo
16200118SECURE PKI COMMUNICATIONS FOR "MACHINE-TO-MACHINE" MODULES, INCLUDING KEY DERIVATION BY MODULES AND AUTHENTICATING PUBLIC KEYSNovember 2018July 2019Allow700NoNo
16198066FRAMEWORK ACTUATOR INTEGRATIONNovember 2018April 2021Allow2910YesNo
16193311METHOD FOR DETERMINING AN INTEGRITY SUM, ASSOCIATED COMPUTER PROGRAM AND ELECTRONIC ENTITYNovember 2018June 2021Allow3110NoNo
16192778Detection And Prevention Of Broadcast And Multicast Packet Attacking For Uncovering And Disconnecting Attackers In Wireless CommunicationsNovember 2018August 2023Abandon5760YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner NIPA, WASIKA.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
6
Examiner Affirmed
3
(50.0%)
Examiner Reversed
3
(50.0%)
Reversal Percentile
71.8%
Higher than average

What This Means

With a 50.0% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
19
Allowed After Appeal Filing
11
(57.9%)
Not Allowed After Appeal Filing
8
(42.1%)
Filing Benefit Percentile
86.9%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 57.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner NIPA, WASIKA - Prosecution Strategy Guide

Executive Summary

Examiner NIPA, WASIKA works in Art Unit 2433 and has examined 333 patent applications in our dataset. With an allowance rate of 79.3%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 30 months.

Allowance Patterns

Examiner NIPA, WASIKA's allowance rate of 79.3% places them in the 41% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.

Office Action Patterns

On average, applications examined by NIPA, WASIKA receive 2.05 office actions before reaching final disposition. This places the examiner in the 68% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by NIPA, WASIKA is 30 months. This places the examiner in the 40% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +25.5% benefit to allowance rate for applications examined by NIPA, WASIKA. This interview benefit is in the 76% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 28.1% of applications are subsequently allowed. This success rate is in the 41% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 12.2% of cases where such amendments are filed. This entry rate is in the 7% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 6% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 71.4% of appeals filed. This is in the 54% percentile among all examiners. Of these withdrawals, 26.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.

Petition Practice

When applicants file petitions regarding this examiner's actions, 22.2% are granted (fully or in part). This grant rate is in the 13% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 12% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.