USPTO Examiner HAILU TESHOME - Art Unit 2434

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18795033COMPUTER INVESTIGATION METHOD AND SYSTEMAugust 2024December 2024Allow500YesNo
18779858WATERMARKING DIGITAL MEDIA FOR AUTHENTICATED CONTENT VERIFICATIONJuly 2024October 2024Allow200YesNo
18756295SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATIONJune 2024December 2024Allow600YesNo
18754090MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT USING ENRICHMENT INFORMATIONJune 2024April 2025Allow910YesNo
18646225CONTENT PERMISSION PLATFORMApril 2024June 2025Abandon1410NoNo
18621269ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHODMarch 2024October 2024Allow600YesNo
18591842Message Authenticated Communication SessionsFebruary 2024January 2025Allow1110YesNo
18585186THREAT MITIGATION SYSTEM AND METHODFebruary 2024January 2025Allow1120YesNo
18411018PRE-AUTHORIZATION ACCESS REQUEST SCREENINGJanuary 2024September 2024Allow800YesNo
18407496SCAN ENGINE EXTENSION FOR CUSTOMIZING APPLICATION SECURITY TESTING BEHAVIORJanuary 2024September 2024Allow800YesNo
18488232SYSTEMS AND METHODS FOR RISK ASSESSMENT OF USER ACCESSES TO DATA RESOURCESOctober 2023June 2025Allow2000YesNo
18374962SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATIONSeptember 2023May 2024Allow800YesNo
18457087METHODS AND SYSTEMS FOR ONBOARDING NETWORK EQUIPMENTAugust 2023May 2024Allow900YesNo
18228982MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT BASED ON MOVEMENT OF A SECURITY THREATAugust 2023May 2024Allow910YesNo
18215992Generative Artificial Intelligence for a Network Security ScannerJune 2023June 2025Allow2400YesNo
18343716DYNAMIC CYBERATTACK MISSION PLANNING AND ANALYSISJune 2023June 2025Allow2400NoNo
18342101HIERARCHICAL NOVELTY DETECTION USING INTENDED STATES FOR NETWORK SECURITYJune 2023December 2024Abandon1810NoNo
18212859Using Machine Learning for Collision Detection to Prevent Unauthorized AccessJune 2023January 2025Allow1900YesNo
18332303CUMULATIVE SUM MODEL FOR IP DENY LISTSJune 2023February 2024Allow800YesNo
18206018SYSTEMS AND METHODS FOR TRUSTED CHAIN CODE SYSTEMJune 2023February 2024Allow900YesNo
18195680Message Authenticated Communication SessionsMay 2023February 2024Allow900YesNo
18308786ADDRESS GENERATION METHOD, BLOCKCHAIN INFORMATION PROCESSING METHOD, AND RELATED DEVICEApril 2023April 2025Allow2400YesNo
18296008DATA PLANE FRAMEWORK FOR REDIRECTING DATA PACKETSApril 2023April 2025Allow2400YesNo
18194791ONTOLOGY-BASED RISK PROPAGATION OVER DIGITAL TWINSApril 2023January 2025Allow2200NoNo
18123075SUSPICIOUS COMMUNICATION DETECTION APPARATUS, SUSPICIOUS COMMUNICATION DETECTION METHOD, AND SUSPICIOUS COMMUNICATION DETECTION PROGRAMMarch 2023February 2025Allow2300YesNo
18117770EVENT EVALUATION PIPELINE FOR ALERT ENGINEMarch 2023November 2024Allow2110NoNo
18112149DATA PROCESSING SYSTEMS AND METHODS FOR AUTOMATICALLY DETECTING AND DOCUMENTING PRIVACY-RELATED ASPECTS OF COMPUTER SOFTWAREFebruary 2023September 2024Allow1910YesNo
18104153AUGMENTED INTELLIGENT MACHINE FOR SYSTEMATIC ATTRIBUTION OF DATA SECURITYJanuary 2023November 2024Allow2100YesNo
18158105Automatic Vulnerability Mitigation in Cloud EnvironmentsJanuary 2023January 2024Allow1200YesNo
18099117TOKENIZED STRUCTURED EXCHANGE TRACKINGJanuary 2023October 2024Allow2100YesNo
18098147DATA EXCHANGE WITH RESOURCE CONSTRAINED TECHNOLOGY IN SURGICAL ENVIRONMENTJanuary 2023November 2024Allow2200YesNo
18149541SYSTEMS AND METHODS FOR DEVICE AUTHENTICATION USING AUTHENTICATION TOKENS DERIVED FROM QUANTUM PARTICLESJanuary 2023October 2024Allow2100YesNo
18075140Subscription and Key Management SystemDecember 2022September 2023Allow1000YesNo
17986661PRIORITIZING ASSETS USING SECURITY METRICSNovember 2022October 2024Allow2320YesNo
18054362METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR GENERATION AND USE OF MOBILE LEGAL IDENTIFICATION DATA OBJECTSNovember 2022August 2024Allow2100YesNo
18051167FABRIC-BASED ROOT-OF-TRUSTOctober 2022January 2025Allow2610YesNo
17971958CLOUD MANAGEMENT OF CONNECTIVITY FOR EDGE NETWORKING DEVICESOctober 2022September 2023Allow1100YesNo
17966805SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATIONOctober 2022August 2023Allow1000YesNo
17937622NETWORK SECURITY MANAGEMENT FOR A BUILDING AUTOMATION SYSTEMOctober 2022August 2023Allow1100YesNo
17956928MIXED NOISE MECHANISM FOR DATA ANONYMIZATIONSeptember 2022March 2025Allow2910YesNo
17952245Distributed one-time-use entry code generation for physical access control method of operation and mobile systemsSeptember 2022April 2025Allow3010YesNo
17952241Distributed one-time-use entry code generation for physical access control method of operation and mobile systemsSeptember 2022April 2025Abandon3010NoNo
17952243Distributed one-time-use entry code generation for physical access control method of operation and mobile systemsSeptember 2022April 2025Allow3110NoNo
17952073SECURE TAMPER RESISTANT DATA PROCESSING, STORAGE, AND TRANSMISSION GATEWAY AND CONTROLLER AND DATA ANOMALY DETECTION PROGRAMSeptember 2022July 2024Allow2200YesNo
17949796REAL-TIME PREVENTION OF MALICIOUS CONTENT VIA DYNAMIC ANALYSISSeptember 2022April 2024Allow1810NoNo
17943637Securely Rehydrating Containerized AgentsSeptember 2022August 2024Allow2300NoNo
17931606MODEM PROCESSOR FIREWALL OPERATIONSSeptember 2022December 2024Abandon2710NoNo
17288236USER AUTHENTICATION SYSTEM, USER AUTHENTICATION SERVER, AND USER AUTHENTICATION METHODSeptember 2022July 2024Allow3800YesNo
17939385METHOD AND APPARATUS FOR CRYPTOGRAPHICALLY ALIGNING AND BINDING A SECURE ELEMENT WITH A HOST DEVICESeptember 2022January 2024Allow1610NoNo
17893124DYNAMIC IDENTITY ATTRIBUTIONAugust 2022June 2024Allow2200YesNo
17891179DECENTRALIZED EDGE NODE AUTHENTICATIONAugust 2022September 2024Allow2500YesNo
17815727ACTIVE FINGERPRINTING FOR TRANSPORT LAYER SECURITY (TLS) SERVERSJuly 2022April 2024Allow2010NoNo
17814484REMOTE HARDWARE ACCESS SERVICEJuly 2022August 2023Allow1310NoNo
17783240CUSTOMIZED ANOMALY DETECTIONJune 2022October 2024Allow2820YesNo
17831131COMPUTER-BASED SYSTEM FOR ANALYZING AND QUANTIFYING CYBER THREAT PATTERNS AND METHODS OF USE THEREOFJune 2022April 2023Allow1100YesNo
17745476SYSTEMS AND METHODS FOR GRAPHICAL VISUALIZATION OF WEB APPLICATION VULNERABILITIESMay 2022February 2024Allow2120YesNo
17662591MULTIPLE APPLICATION AUTHENTICATIONMay 2022April 2024Allow2400YesNo
17739364DATA PROCESSING SYSTEMS FOR ASSESSING READINESS FOR RESPONDING TO PRIVACY-RELATED INCIDENTSMay 2022May 2024Allow2400YesNo
17755692PUBLIC KEY ENCRYPTION USING SELF POWERED TIMERSMay 2022October 2024Allow2900YesNo
17709815PRESERVING CONFIDENTIALITY OF TENANTS IN CLOUD ENVIRONMENT WHEN DEPLOYING SECURITY SERVICESMarch 2022February 2024Allow2300YesNo
17710523IDENTIFYING AUTOMATED RESPONSES TO SECURITY THREATS BASED ON COMMUNICATION INTERACTIONS CONTENTMarch 2022August 2023Allow1710YesNo
17707629COMBINED SHA2 AND SHA3 BASED XMSS HARDWARE ACCELERATORMarch 2022October 2023Allow1910YesNo
17762341COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR STORING CERTIFIED DATA ON A BLOCKCHAINMarch 2022April 2025Allow3710NoNo
17675330AUTOMATED PRIORITIZATION OF PROCESS-AWARE CYBER RISK MITIGATIONFebruary 2022January 2025Allow3520NoNo
17592890SYSTEMS AND METHODS FOR MANAGING FIREWALL RULES AND CONNECTIONS BETWEEN DIFFERENT SERVICESFebruary 2022April 2024Allow2710YesNo
17643475VIDEO IMAGES FOR PLATOONINGDecember 2021April 2024Abandon2810NoNo
17456896GENERATING A SPEEDING TICKET USING A PERSISTENTLY STORED CHARACTER CODE IN A CAMERA FOR MASKING INFORMATION ABOUT CHARACTERS OF A NUMBER PLATE OF A VEHICLENovember 2021December 2023Allow2500YesNo
17524741ENCRYPTION USING RECURSIVE KEYNovember 2021April 2025Abandon4110NoNo
17511876COMMUNICATION PROTOCOL FOR NON-INTERNET-ENABLED DEVICESOctober 2021March 2024Allow2910YesNo
17502375Storage Node Security Statement Management in a Distributed Storage ClusterOctober 2021October 2023Allow2400NoNo
17492973SYSTEMS AND METHODS TO AUTHENTICATE A NON-FIFTH GENERATION CAPABLE DEVICE ON A RESIDENTIAL GATEWAYOctober 2021October 2023Allow2400NoNo
17493060MULTITENANT SHARING ANOMALY CYBERATTACK CAMPAIGN DETECTIONOctober 2021October 2023Allow2400YesNo
17493494DETECTING NETWORK ENTITIES THAT POSE A CYBERSECURITY RISK TO A PRIVATE COMPUTER NETWORKOctober 2021February 2024Allow2910NoNo
17493681POLICY-GOVERNED CRYPTOGRAPHIC SELECTION SYSTEMOctober 2021December 2024Abandon3910NoNo
17469490ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHODSeptember 2021December 2023Allow2810YesNo
17466657IDENTITY SYSTEMS, METHODS, AND MEDIA FOR AUDITING AND NOTIFYING USERS CONCERNING VERIFIABLE CLAIMSSeptember 2021December 2023Allow2820YesNo
17460860METHODS, SYSTEMS, AND MEDIA FOR RECOVERING IDENTITY INFORMATION IN VERIFIABLE CLAIMS-BASED SYSTEMSAugust 2021June 2023Allow2210YesNo
17401450Message Authenticated Communication SessionsAugust 2021February 2023Allow1800YesNo
17397140DATA ENCRYPTION AND DECRYPTIONAugust 2021April 2022Allow810YesNo
17444341UTILIZING MODELS TO INTEGRATE DATA FROM MULTIPLE SECURITY SYSTEMS AND IDENTIFY A SECURITY RISK SCORE FOR AN ASSETAugust 2021October 2023Allow2600NoNo
17443633CYBERSECURITY THREAT MODELING AND ANALYSIS WITH TEXT MINER AND DATA FLOW DIAGRAM EDITORJuly 2021November 2022Allow1500NoNo
17386378Domain Security Assurance AutomationJuly 2021June 2023Allow2300YesNo
17380857EVENT EVALUATION PIPELINE FOR ALERT ENGINEJuly 2021September 2022Allow1400YesNo
17380941NETWORK ASSET RISK ANALYSISJuly 2021June 2023Abandon2310NoNo
17376487INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING SYSTEMJuly 2021May 2024Allow3410YesNo
17371394Application identity-based enforcement of datagram protocolsJuly 2021February 2023Allow1920NoNo
17365171MAN-IN-THE-MIDDLE INTERCEPTOR FOR APPLICATION SECURITY TESTINGJuly 2021October 2023Allow2700NoNo
17305072SYSTEMS AND METHODS FOR USER-BASED AUTHENTICATIONJune 2021April 2024Allow3320NoNo
17304941Non-invasive virus scanning using remote accessJune 2021November 2023Allow2830YesNo
17358486EXECUTING ENTERPRISE PROCESS ABSTRACTION USING PROCESS AWARE ANALYTICAL ATTACK GRAPHSJune 2021October 2022Allow1500YesNo
17309769PACKET ANALYSIS AND FILTERINGJune 2021August 2023Allow2600YesNo
17349962SYSTEMS AND METHODS FOR DATA TRANSFER AND STORAGEJune 2021December 2023Allow3000YesNo
17346826WIDEBAND FEATURELESS RATELESS CHAOTIC WAVEFORM GENERATION METHODJune 2021December 2022Allow1800YesNo
17303776CUMULATIVE SUM MODEL FOR IP DENY LISTSJune 2021April 2023Allow2210YesNo
17338345VIRTUAL RELAY DEVICE FOR PROVIDING A SECURE CONNECTION TO A REMOTE DEVICEJune 2021April 2024Allow3420YesNo
17327555BINDING DATA TO A NETWORK IN THE PRESENCE OF AN ENTITYMay 2021April 2024Allow3430YesNo
17323731DYNAMIC NETWORK SECURITY MONITORING SYSTEMMay 2021November 2022Allow1810NoNo
17323651TEMPORAL-BASED ANOMALY DETECTION FOR NETWORK SECURITYMay 2021July 2023Allow2610YesNo
17294682FLEXIBLE CREDENTIAL SUPPORTED SOFTWARE SERVICE PROVISIONINGMay 2021July 2024Allow3820YesNo
17319523SYSTEMS AND METHODS FOR TRUSTED CHAIN CODE SYSTEMMay 2021February 2023Allow2200YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner HAILU, TESHOME.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
32
Examiner Affirmed
19
(59.4%)
Examiner Reversed
13
(40.6%)
Reversal Percentile
62.7%
Higher than average

What This Means

With a 40.6% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
76
Allowed After Appeal Filing
30
(39.5%)
Not Allowed After Appeal Filing
46
(60.5%)
Filing Benefit Percentile
62.3%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 39.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner HAILU, TESHOME - Prosecution Strategy Guide

Executive Summary

Examiner HAILU, TESHOME works in Art Unit 2434 and has examined 821 patent applications in our dataset. With an allowance rate of 83.4%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 28 months.

Allowance Patterns

Examiner HAILU, TESHOME's allowance rate of 83.4% places them in the 51% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by HAILU, TESHOME receive 1.69 office actions before reaching final disposition. This places the examiner in the 48% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by HAILU, TESHOME is 28 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +22.5% benefit to allowance rate for applications examined by HAILU, TESHOME. This interview benefit is in the 72% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 31.5% of applications are subsequently allowed. This success rate is in the 57% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 20.7% of cases where such amendments are filed. This entry rate is in the 18% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 44.4% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 38% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 62.8% of appeals filed. This is in the 36% percentile among all examiners. Of these withdrawals, 37.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 48.1% are granted (fully or in part). This grant rate is in the 56% percentile among all examiners. Strategic Note: Petitions show above-average success regarding this examiner's actions. Petitionable matters include restriction requirements (MPEP § 1002.02(c)(2)) and various procedural issues.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 1.3% of allowed cases (in the 72% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.