USPTO Examiner ALI AFAQ - Art Unit 2434

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18626087AUTOMATED CREATION OF TRUSTED NETWORK PERIMETERApril 2024September 2024Allow510YesNo
18613728Detecting Data Exfiltration and Compromised User Accounts in a Computing NetworkMarch 2024January 2025Allow1010NoNo
18440636System and Method for Controlling Access Based on Preconditioned ActivitiesFebruary 2024June 2025Abandon1620NoNo
18406799NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONSJanuary 2024April 2024Allow310NoNo
18393335SYSTEMS AND METHODS FOR PRIORITIZING URL REVIEW FOR SANDBOXING BASED ON ACCELERATED VELOCITIES OF URL FEATURES IN NETWORK TRAFFICDecember 2023October 2024Allow1010YesNo
18543380Command and Control Steganographic Communications Detection EngineDecember 2023October 2024Allow1010NoNo
18523646COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR ENABLING ZERO-KNOWLEDGE PROOFNovember 2023March 2025Allow1620NoNo
18483041SYSTEMS AND METHODS FOR NETWORK SECURITYOctober 2023August 2024Allow1010YesNo
18375562Honeypot Network Management Based on Probabilistic Detection of Malicious Port ActivityOctober 2023August 2024Allow1110NoNo
18468531NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONSSeptember 2023October 2023Allow100NoNo
18241290FACILITATING NETWORK CONNECTIVITYSeptember 2023November 2024Allow1520YesNo
18449350LIVE DISCOVERY OF ENTERPRISE THREATS BASED ON SECURITY QUERY ACTIVITYAugust 2023March 2024Allow700NoNo
18361512AUTOMATED CREATION OF TRUSTED NETWORK PERIMETERJuly 2023January 2024Allow610YesNo
18195315SYSTEMS AND METHODS FOR AUTOMATED ANOMALOUS BEHAVIOR DETECTION AND RISK-SCORING INDIVIDUALSMay 2023February 2025Allow2140YesNo
18297111COMPUTER NETWORKING WITH SECURITY FEATURESApril 2023August 2024Allow1620YesNo
18191614METHOD AND SYSTEM FOR PROCESSING DATA PACKAGESMarch 2023April 2025Allow2410NoNo
18182979SYSTEMS, METHODS, AND DEVICES FOR PREVENTING CREDENTIAL PASSING ATTACKSMarch 2023June 2025Allow2810NoNo
18114577COMPUTER SOFTWARE IMPLEMENTED CYBERSECURITY FOR MATRIX BARCODE INTERACTION WITH SMART DEVICEFebruary 2023March 2025Allow2510NoNo
18157849METHOD AND SYSTEM FOR IDENTIFYING AN OPTIMIZED SET OF CODE COMMITS TO PERFORM VULNERABILITY REMEDIATIONJanuary 2023March 2025Allow2610NoNo
18094580MALICIOUS INCIDENT VISUALIZATIONJanuary 2023February 2025Allow2540YesYes
18149193SYSTEM AND METHOD FOR DETECTING AND COUNTERING MALICIOUS CODEJanuary 2023February 2025Allow2610NoNo
18148934NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONSDecember 2022September 2023Allow920YesNo
18060186HYGIENE COMPLIANCE DATA CHANNELNovember 2022April 2025Allow2910NoNo
18058390Command and Control Steganographic Communications Detection EngineNovember 2022November 2023Allow1110YesNo
17967416ACCESS ENFORCEMENT THROUGH AUTHENTICATION VERIFICATION ENTITY (AVE)October 2022May 2025Allow3120YesNo
17957906TERMINAL DEVICE VERIFICATION METHOD AND APPARATUSSeptember 2022March 2025Allow3010NoNo
17956776FAST FORWARDED SECURITY ISSUE IDENTIFICATION USING DIGITAL TWINSSeptember 2022April 2025Allow3110YesNo
17911853Cyber Security System and MethodSeptember 2022October 2024Allow2510NoNo
17900651MALICIOUS WEBSITE DETECTION USING CERTIFICATE CLASSIFIERAugust 2022June 2025Allow3320YesNo
17895631WHITELIST-AUTHENTICATED IMAGE AND INTERACTIVE SERVICEAugust 2022May 2025Allow3320NoNo
17819717DETECTION SYSTEM, DETECTION METHOD, AND COMPUTER PROGRAM PRODUCTAugust 2022May 2025Allow3310YesNo
17798985SECURITY AND PRIVACY SUPPORT FOR DIRECT WIRELESS COMMUNICATIONSAugust 2022May 2025Allow3320NoNo
17812909CYBERSECURITY THREAT DETECTION UTILIZING UNIFIED IDENTITY MAPPING AND PERMISSION DETECTIONJuly 2022December 2024Allow2920NoNo
17810973OBSCURING ELEMENTS BASED ON BROWSER FOCUSJuly 2022October 2024Allow2710YesNo
17850130EDGE DATA PROCESSING UTILIZING PER-ENDPOINT SUBSCRIBER CONFIGURABLE DATA PROCESSING WORKLOADSJune 2022September 2024Allow2610YesNo
17753862PROVISIONING AND AUTHENTICATING DEVICE CERTIFICATESMarch 2022January 2025Abandon3420NoNo
17691930NETWORK ATTACK PREVENTION SYSTEMS AND METHODSMarch 2022March 2025Allow3610YesNo
17687235PRIVACY PREFERENCE BASED DEVICE CONTROLSMarch 2022February 2025Allow3610NoNo
17633779SECURE INFORMATION SHARING SYSTEMS AND METHODSFebruary 2022December 2024Allow3410NoNo
17588748DOMAIN-SPECIFIC ACCESS MANAGEMENT USING IP FILTERINGJanuary 2022May 2024Allow2810YesNo
17548680TRANSACTION REQUEST CONSTRUCTION METHOD AND APPARATUS, TRANSACTION REQUEST PROCESSING METHOD AND APPARATUS, DEVICE AND STORAGE MEDIUMDecember 2021July 2024Allow3110NoNo
17546829Adaptive Online Service Access ControlDecember 2021December 2024Allow3620YesYes
17497294SYSTEM AND METHOD FOR DETECTING MALICIOUS ATTEMPTS TO DISCOVER VULNERABILITIES IN A WEB APPLICATIONOctober 2021May 2025Allow4310NoNo
17444250AUTONOMOUS ALERTING BASED ON DEFINED CATEGORIZATIONS FOR NETWORK SPACE AND NETWORK BOUNDARY CHANGESAugust 2021November 2023Allow2810NoNo
17423750PROVIDING VIRTUAL MACHINES FOR CENTRALIZED INTEGRATION WITH PERIPHERALS INCLUDING BIOMETRIC DEVICESJuly 2021September 2024Allow3820NoNo
17377261AUTONOMOUS VEHICLE SECURITY MEASURES IN RESPONSE TO AN ATTACK ON AN IN-VEHICLE COMMUNICATION NETWORKJuly 2021March 2024Allow3230YesNo
17421254METHOD AND SYSTEM FOR INFORMATION TRANSMISSIONJuly 2021February 2025Allow4310NoNo
17367463LOGIN AND CONSENT METHODOLOGY THAT FOLLOWS REST PRINCIPLES AND USES THE OAUTH PROTOCOL WITH ATTESTED CLIENTSJuly 2021September 2024Allow3910NoNo
17357546ANOMALOUS ACTION SECURITY ASSESSORJune 2021September 2023Allow2710YesNo
17304695PROTECTING ACCELERATORS FROM MALICIOUS NETWORK FUNCTIONSJune 2021July 2024Allow3710YesNo
17355484COMMUNICATION CONTROL DEVICE AND COMMUNICATION CONTROL SYSTEMJune 2021May 2023Allow2310NoNo
17417129INTERCEPTING DEVICESJune 2021September 2024Abandon3920YesNo
17350199System and Method for Continuous User AuthenticationJune 2021July 2024Abandon3710NoNo
17343680DATA AUGMENTATION FOR THREAT INVESTIGATION IN AN ENTERPRISE NETWORKJune 2021February 2024Allow3330YesNo
17343670LIVE DISCOVERY OF ENTERPRISE THREATS BASED ON SECURITY QUERY ACTIVITYJune 2021February 2023Allow2020YesNo
17342421DETERMINING ADDITIONAL SIGNALS FOR DETERMINING CYBERSECURITY RISKJune 2021April 2024Allow3510YesNo
17335920PERSONALLY IDENTIFIABLE INFORMATION REMOVAL BASED ON PRIVATE AREA LOGICJune 2021December 2023Allow3110NoNo
17334799SYSTEM FOR MANAGING IOT DEVICESMay 2021March 2023Allow2110NoNo
17332721CONDITIONAL SECURITY MEASURES USING ROLLING SET OF RISK SCORESMay 2021July 2023Allow2510YesNo
17331156DYNAMIC SEGMENTATION APPARATUS AND METHOD FOR PREVENTING SPREAD OF SECURITY THREATMay 2021September 2023Abandon2810NoNo
17329953METHOD AND DEVICE FOR PROCESSING DATA OF A TECHNICAL SYSTEMMay 2021March 2023Allow2220NoNo
17317257DETECTING DATA EXFILTRATION AND COMPROMISED USER ACCOUNTS IN A COMPUTING NETWORKMay 2021January 2024Allow3210NoNo
17242442AUGMENTED REALITY-BASED ACCESS CONTROL FOR NETWORK DEVICESApril 2021December 2023Allow3210YesNo
17243201SYSTEM FOR DETECTION OF ENTITIES ASSOCIATED WITH COMPROMISED RECORDSApril 2021July 2023Allow2710YesNo
17229884System, Device, and Method of Determining Cyber Attack Vectors and Mitigating Cyber AttacksApril 2021September 2022Allow1700NoNo
17214627SYSTEMS AND METHODS FOR PRIORITIZING URL REVIEW FOR SANDBOXING BASED ON ACCELERATED VELOCITIES OF URL FEATURES IN NETWORK TRAFFICMarch 2021August 2023Allow2930YesNo
17209767SCHEDULING METHOD AND APPARATUS, DEVICE AND STORAGE MEDIUMMarch 2021October 2023Allow3110YesNo
17196633PROBABILISTICALLY IDENTIFYING ANOMALOUS HONEYPOT ACTIVITYMarch 2021May 2023Allow2710NoNo
17194766CUSTOM TRIGGERS FOR A NETWORK SECURITY EVENT FOR CYBERSECURITY THREAT INTELLIGENCEMarch 2021August 2023Allow2910NoNo
17186235CYBER DIGITAL TWIN SIMULATOR FOR SECURITY CONTROLS REQUIREMENTSFebruary 2021June 2023Allow2810NoNo
17187255MEASURING THE SENSITIVITY OF NEURAL NETWORK IMAGE CLASSIFIERS AGAINST ADVERSARIAL ATTACKSFebruary 2021February 2024Allow3610NoNo
17187379CYBER SECURITY SYSTEM APPLYING NETWORK SEQUENCE PREDICTION USING TRANSFORMERSFebruary 2021November 2023Allow3310NoNo
17172788AUTOMATED AND SCALABLE WORKER ORCHESTRATION FOR CLOUD-BASED COMPUTER FORENSIC ANALYSISFebruary 2021June 2023Allow2810YesNo
17166714COMPUTER NETWORKING WITH SECURITY FEATURESFebruary 2021February 2023Allow2510NoNo
17161398AUTOMATED CREATION OF TRUSTED NETWORK PERIMETERJanuary 2021May 2023Allow2810YesNo
17263281ELECTRONIC DEVICE FOR PROCESSING DIGITAL KEY, AND OPERATION METHOD THEREFORJanuary 2021March 2023Allow2610NoNo
17154808SYSTEMS AND METHODS FOR NETWORK SECURITYJanuary 2021June 2023Allow2810YesNo
17153605Command and Control Steganographic Communications Detection EngineJanuary 2021November 2022Allow2210NoNo
17149855ARTIFICIAL INTELLIGENCE REVERSE VENDOR COLLATIONJanuary 2021August 2023Allow3030NoNo
17146180SYSTEMS AND METHODS FOR AUTOMATED ANOMALOUS BEHAVIOR DETECTION AND RISK-SCORING INDIVIDUALSJanuary 2021December 2022Allow2410YesNo
17255851FACILITATING NETWORK CONNECTIVITYDecember 2020May 2023Allow2910YesNo
17121096POLICY-DRIVEN VIEWS OF DATASETSDecember 2020March 2024Allow3930YesNo
17103777SECURE AUTHENTICATION FOR A VIRTUAL COMPUTERNovember 2020April 2024Allow4130YesNo
17103131SYSTEM SECURITY EVALUATION MODELNovember 2020January 2024Allow3810NoNo
17100759DATA POLICIES FOR ONLINE SERVICESNovember 2020April 2025Allow5330YesNo
16949945SELECTION OF AUTHENTICATION FUNCTION ACCORDING TO ENVIRONMENT OF USER DEVICENovember 2020December 2023Allow3720YesNo
17096437INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUMNovember 2020November 2023Allow3610NoNo
17090275DETECTION OF ABNORMAL OR MALICIOUS ACTIVITY IN POINT-TO-POINT OR PACKET-SWITCHED NETWORKSNovember 2020October 2023Abandon3520NoNo
16949175PROTECTING DATA IN NON-VOLATILE STORAGES PROVIDED TO CLOUDS AGAINST MALICIOUS ATTACKSOctober 2020January 2023Allow2720YesNo
17068868DETECTING MANIPULATION OF DATA ON A CAN BUSOctober 2020November 2022Allow2520NoNo
17066430METHODS AND SYSTEMS THAT DETECT AND DEFLECT DENIAL-OF-SERVICE ATTACKSOctober 2020October 2023Abandon3620NoNo
17037186HYBRID INTRUSION DETECTION MODEL FOR CYBER-ATTACKS IN AVIONICS INTERNET GATEWAYS USING EDGE ANALYTICSSeptember 2020December 2022Allow2710NoNo
15733664MALWARE BARRIERSeptember 2020June 2022Allow2000NoNo
17031083SYSTEM AND METHOD FOR DETECTING AND BLOCKING MALICIOUS ATTACKS ON A NETWORKSeptember 2020October 2022Allow2510NoNo
17031372NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONSSeptember 2020November 2022Allow2510YesNo
17040480COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR ENABLING ZERO-KNOWLEDGE PROOFSeptember 2020June 2023Allow3320NoNo
17024201ADVANCED INTERSTITIAL TECHNIQUES FOR WEB SECURITYSeptember 2020December 2022Allow2710NoNo
16980405METHOD AND APPARATUS PROCESSING OF MESSAGE DATASeptember 2020March 2024Abandon4240YesNo
17010376COLLECTION OF DIAGNOSTIC INFORMATION IN A DEVICESeptember 2020September 2023Allow3610NoNo
16998846METHOD TO DETECT DATABASE MANAGEMENT SYSTEM SQL CODE ANOMALIESAugust 2020November 2022Allow2710NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner ALI, AFAQ.

Strategic Value of Filing an Appeal

Total Appeal Filings
2
Allowed After Appeal Filing
1
(50.0%)
Not Allowed After Appeal Filing
1
(50.0%)
Filing Benefit Percentile
77.1%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 50.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner ALI, AFAQ - Prosecution Strategy Guide

Executive Summary

Examiner ALI, AFAQ works in Art Unit 2434 and has examined 112 patent applications in our dataset. With an allowance rate of 92.9%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 29 months.

Allowance Patterns

Examiner ALI, AFAQ's allowance rate of 92.9% places them in the 79% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.

Office Action Patterns

On average, applications examined by ALI, AFAQ receive 1.47 office actions before reaching final disposition. This places the examiner in the 35% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by ALI, AFAQ is 29 months. This places the examiner in the 46% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +5.2% benefit to allowance rate for applications examined by ALI, AFAQ. This interview benefit is in the 30% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 41.5% of applications are subsequently allowed. This success rate is in the 92% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 63.0% of cases where such amendments are filed. This entry rate is in the 85% percentile among all examiners. Strategic Recommendation: This examiner is highly receptive to after-final amendments compared to other examiners. Per MPEP § 714.12, after-final amendments may be entered "under justifiable circumstances." Consider filing after-final amendments with a clear showing of allowability rather than immediately filing an RCE, as this examiner frequently enters such amendments.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 7% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 88% percentile among all examiners. Of these withdrawals, 50.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.

Petition Practice

When applicants file petitions regarding this examiner's actions, 0.0% are granted (fully or in part). This grant rate is in the 2% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 12% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Consider after-final amendments: This examiner frequently enters after-final amendments. If you can clearly overcome rejections with claim amendments, file an after-final amendment before resorting to an RCE.
  • RCEs are effective: This examiner has a high allowance rate after RCE compared to others. If you receive a final rejection and have substantive amendments or arguments, an RCE is likely to be successful.
  • Appeal filing as negotiation tool: This examiner frequently reconsiders rejections during the appeal process. Filing a Notice of Appeal may prompt favorable reconsideration during the mandatory appeal conference.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.