USPTO Examiner HAILU TESHOME - Art Unit 2434

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19301719METHODS FOR NON-INVASIVE API DISCOVERY, MONITORING AND EXPLOITATION DETECTION IN THIRD-PARTY PROCESSESAugust 2025November 2025Allow300NoNo
19014413ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHODJanuary 2025February 2026Allow1310NoNo
18966712WATERMARKING DIGITAL MEDIA FOR CONTENT VERIFICATION WITH DIFFERENTIAL DETECTIONDecember 2024October 2025Allow1100NoNo
18912441SECURE TAMPER RESISTANT DATA PROCESSING, STORAGE, AND TRANSMISSION GATEWAY AND CONTROLLER AND DATA ANOMALY DETECTION PROGRAMOctober 2024March 2026Allow1700YesNo
18851393SINGLE REQUEST ARCHITECTURE FOR INCREASING EFFICIENCY OF SECURE MULTI-PARTY COMPUTATIONSSeptember 2024January 2026Allow1500NoNo
18843024PROOF OF DATA RETENTION WITH BLOCKCHAINAugust 2024March 2026Allow1800YesNo
18799687MULTI-ROUTE VIRTUAL PRIVATE NETWORKINGAugust 2024December 2025Allow1600YesNo
18797912METHODS, COMPUTER DEVICES, AND NON-TRANSITORY COMPUTER-READABLE RECORD MEDIA FOR LEARNING OF WATERMARKING MODEL USING COMPLEX ATTACKAugust 2024December 2025Allow1700YesNo
18795848REAL-TIME PREVENTION OF MALICIOUS CONTENT VIA DYNAMIC ANALYSISAugust 2024February 2026Allow1810NoNo
18795033COMPUTER INVESTIGATION METHOD AND SYSTEMAugust 2024December 2024Allow500YesNo
18790505TRAINING AND USING MULTI-TASK PREDICTIVE RISK MODELS IN SOFTWARE APPLICATIONSJuly 2024December 2025Allow1600YesNo
18779858WATERMARKING DIGITAL MEDIA FOR AUTHENTICATED CONTENT VERIFICATIONJuly 2024October 2024Allow200YesNo
18772926PERIPHERAL DEVICE SANDBOXJuly 2024February 2026Allow1910NoNo
18769044APPARATUS AND METHOD FOR PERFORMING THREAT ANALYSIS AND RISK ASSESSMENT FOR VEHICLE CYBERSECURITYJuly 2024October 2025Allow1500YesNo
18759745ENTITY MALICIOUSNESS ANALYSIS USING AUTONOMOUS ARTIFICIAL INTELLIGENCE AGENTSJune 2024October 2025Allow1500NoNo
18756295SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATIONJune 2024December 2024Allow600YesNo
18754090MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT USING ENRICHMENT INFORMATIONJune 2024April 2025Allow910YesNo
18744401INSPECTING REQUESTS AND RESPONSES TO IDENTIFY APPLICATION VULNERABILITIESJune 2024September 2025Allow1500YesNo
18735120PRESERVING CONFIDENTIALITY OF TENANTSJune 2024February 2026Allow2010NoNo
18732277SYSTEM AND METHOD FOR MANAGING THREATS IN OPEN TRANSACTION NETWORKSJune 2024November 2025Allow1700YesNo
18680079AUTHENTICATION FOR WIRELESS NETWORKSMay 2024February 2026Allow2010NoNo
18672970HYBRID PKI KEYLOADER METHODS AND SYSTEMSMay 2024October 2025Allow1700YesNo
18662868Systems And Methods For Zero-Shot Detection Of Malicious Network Communications Through Deployment Of Artificial Intelligence TechniquesMay 2024August 2025Allow1600YesNo
18649585Accessing Cloud Environments Through Administrative Tenancies To Comply With Sovereignty RequirementsApril 2024December 2025Allow2010YesNo
18646225CONTENT PERMISSION PLATFORMApril 2024June 2025Abandon1410NoNo
18645084REAL-TIME RANSOM AND SECURITY BREACH DETECTION AND PREVENTIONApril 2024August 2025Allow1600YesNo
18639867BYZANTINE SITUATION-AWARE DEFENSIVE SYSTEM FOR ZERO TRUST ARCHITECTURESApril 2024October 2025Allow1800YesNo
18638944Analyzing Cloud-Based Services for Compliance with Multiple RegulationsApril 2024December 2025Allow1910NoNo
18632965Recommendations for cybersecurity based on threat intelligenceApril 2024December 2025Allow2010NoNo
18621269ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHODMarch 2024October 2024Allow600YesNo
18611444SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO FEATURES OF AN ELECTRONIC DEVICEMarch 2024November 2025Allow1910NoNo
18602470QUANTUM SECURITY SYSTEM AND METHOD FOR CLASSICAL AND QUANTUM NETWORKSMarch 2024November 2025Allow2010YesNo
18591842Message Authenticated Communication SessionsFebruary 2024January 2025Allow1110YesNo
18592430THREAT DETECTION AND REMEDIATIONFebruary 2024February 2026Allow2310NoNo
18585186THREAT MITIGATION SYSTEM AND METHODFebruary 2024January 2025Allow1120YesNo
18582933CYBERTHREAT REMEDIATION USING A ZERO TRUST ENGINEFebruary 2024August 2025Allow1700YesNo
18425835SECURITY ENGINE FOR APPLICATION DEPLOYMENT PIPELINESJanuary 2024July 2025Allow1700YesNo
18411018PRE-AUTHORIZATION ACCESS REQUEST SCREENINGJanuary 2024September 2024Allow800YesNo
18407496SCAN ENGINE EXTENSION FOR CUSTOMIZING APPLICATION SECURITY TESTING BEHAVIORJanuary 2024September 2024Allow800YesNo
18576130INFORMATION MANAGEMENT SYSTEM, INFORMATION MANAGEMENT METHOD, AND INFORMATION SHARING SYSTEMJanuary 2024July 2025Allow1800YesNo
18571986ATTACK SCENARIO GENERATING APPARATUS, ATTACK SCENARIO GENERATING METHOD, AND COMPUTER READABLE RECORDING MEDIUMDecember 2023February 2026Allow2610NoNo
18488232SYSTEMS AND METHODS FOR RISK ASSESSMENT OF USER ACCESSES TO DATA RESOURCESOctober 2023June 2025Allow2000YesNo
18374962SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATIONSeptember 2023May 2024Allow800YesNo
18457087METHODS AND SYSTEMS FOR ONBOARDING NETWORK EQUIPMENTAugust 2023May 2024Allow900YesNo
18237120METHOD AND SYSTEM FOR ENSURING COMPLIANCE OF COMPUTING SYSTEMSAugust 2023August 2025Allow2400YesNo
18228982MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT BASED ON MOVEMENT OF A SECURITY THREATAugust 2023May 2024Allow910YesNo
18360597BROWSER SECURITY VIA DOCUMENT OBJECT MODEL MANIPULATIONJuly 2023February 2026Allow3020YesNo
18215992Generative Artificial Intelligence for a Network Security ScannerJune 2023June 2025Allow2400YesNo
18343716DYNAMIC CYBERATTACK MISSION PLANNING AND ANALYSISJune 2023June 2025Allow2400NoNo
18342101HIERARCHICAL NOVELTY DETECTION USING INTENDED STATES FOR NETWORK SECURITYJune 2023December 2024Abandon1810NoNo
18212859Using Machine Learning for Collision Detection to Prevent Unauthorized AccessJune 2023January 2025Allow1900YesNo
18332303CUMULATIVE SUM MODEL FOR IP DENY LISTSJune 2023February 2024Allow800YesNo
18206018SYSTEMS AND METHODS FOR TRUSTED CHAIN CODE SYSTEMJune 2023February 2024Allow900YesNo
18201162Method and System for Making Identity DecisionsMay 2023April 2025Allow2200YesNo
18195680Message Authenticated Communication SessionsMay 2023February 2024Allow900YesNo
18308786ADDRESS GENERATION METHOD, BLOCKCHAIN INFORMATION PROCESSING METHOD, AND RELATED DEVICEApril 2023April 2025Allow2400YesNo
18296008DATA PLANE FRAMEWORK FOR REDIRECTING DATA PACKETSApril 2023April 2025Allow2400YesNo
18194791ONTOLOGY-BASED RISK PROPAGATION OVER DIGITAL TWINSApril 2023January 2025Allow2200NoNo
18128037METHOD AND APPARATUS FOR PROVIDING A SHARED MOBILITY SERVICEMarch 2023February 2026Allow3410NoNo
18125223DYNAMIC COMPUTING PLATFORM FOR REAL-TIME DATA CONTAINER GENERATION, AUTHORIZATION, AND THROTTLING MANAGEMENTMarch 2023October 2025Allow3100NoNo
18123075SUSPICIOUS COMMUNICATION DETECTION APPARATUS, SUSPICIOUS COMMUNICATION DETECTION METHOD, AND SUSPICIOUS COMMUNICATION DETECTION PROGRAMMarch 2023February 2025Allow2300YesNo
18117770EVENT EVALUATION PIPELINE FOR ALERT ENGINEMarch 2023November 2024Allow2110NoNo
18112149DATA PROCESSING SYSTEMS AND METHODS FOR AUTOMATICALLY DETECTING AND DOCUMENTING PRIVACY-RELATED ASPECTS OF COMPUTER SOFTWAREFebruary 2023September 2024Allow1910YesNo
18104153AUGMENTED INTELLIGENT MACHINE FOR SYSTEMATIC ATTRIBUTION OF DATA SECURITYJanuary 2023November 2024Allow2100YesNo
18158105Automatic Vulnerability Mitigation in Cloud EnvironmentsJanuary 2023January 2024Allow1200YesNo
18156863System and method for implementing token-based authentication of text messagesJanuary 2023September 2025Allow3120YesNo
18099117TOKENIZED STRUCTURED EXCHANGE TRACKINGJanuary 2023October 2024Allow2100YesNo
18098147DATA EXCHANGE WITH RESOURCE CONSTRAINED TECHNOLOGY IN SURGICAL ENVIRONMENTJanuary 2023November 2024Allow2200YesNo
18149541SYSTEMS AND METHODS FOR DEVICE AUTHENTICATION USING AUTHENTICATION TOKENS DERIVED FROM QUANTUM PARTICLESJanuary 2023October 2024Allow2100YesNo
18075140Subscription and Key Management SystemDecember 2022September 2023Allow1000YesNo
17989731CLOUD-DISTRIBUTED APPLICATION RUNTIME - AN EMERGING LAYER OF MULTI-CLOUD APPLICATION SERVICES FABRICNovember 2022July 2025Allow3200YesNo
17986661PRIORITIZING ASSETS USING SECURITY METRICSNovember 2022October 2024Allow2320YesNo
18054362METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR GENERATION AND USE OF MOBILE LEGAL IDENTIFICATION DATA OBJECTSNovember 2022August 2024Allow2100YesNo
18051167FABRIC-BASED ROOT-OF-TRUSTOctober 2022January 2025Allow2610YesNo
17971958CLOUD MANAGEMENT OF CONNECTIVITY FOR EDGE NETWORKING DEVICESOctober 2022September 2023Allow1100YesNo
17966805SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATIONOctober 2022August 2023Allow1000YesNo
17937622NETWORK SECURITY MANAGEMENT FOR A BUILDING AUTOMATION SYSTEMOctober 2022August 2023Allow1100YesNo
17956928MIXED NOISE MECHANISM FOR DATA ANONYMIZATIONSeptember 2022March 2025Allow2910YesNo
17952243Distributed one-time-use entry code generation for physical access control method of operation and mobile systemsSeptember 2022April 2025Allow3110NoNo
17952245Distributed one-time-use entry code generation for physical access control method of operation and mobile systemsSeptember 2022April 2025Allow3010YesNo
17952241Distributed one-time-use entry code generation for physical access control method of operation and mobile systemsSeptember 2022April 2025Abandon3010NoNo
17952073SECURE TAMPER RESISTANT DATA PROCESSING, STORAGE, AND TRANSMISSION GATEWAY AND CONTROLLER AND DATA ANOMALY DETECTION PROGRAMSeptember 2022July 2024Allow2200YesNo
17949796REAL-TIME PREVENTION OF MALICIOUS CONTENT VIA DYNAMIC ANALYSISSeptember 2022April 2024Allow1810NoNo
17943637Securely Rehydrating Containerized AgentsSeptember 2022August 2024Allow2300NoNo
17931606MODEM PROCESSOR FIREWALL OPERATIONSSeptember 2022December 2024Abandon2710NoNo
17288236USER AUTHENTICATION SYSTEM, USER AUTHENTICATION SERVER, AND USER AUTHENTICATION METHODSeptember 2022July 2024Allow3800YesNo
17939385METHOD AND APPARATUS FOR CRYPTOGRAPHICALLY ALIGNING AND BINDING A SECURE ELEMENT WITH A HOST DEVICESeptember 2022January 2024Allow1610NoNo
17893124DYNAMIC IDENTITY ATTRIBUTIONAugust 2022June 2024Allow2200YesNo
17891179DECENTRALIZED EDGE NODE AUTHENTICATIONAugust 2022September 2024Allow2500YesNo
17815727ACTIVE FINGERPRINTING FOR TRANSPORT LAYER SECURITY (TLS) SERVERSJuly 2022April 2024Allow2010NoNo
17814484REMOTE HARDWARE ACCESS SERVICEJuly 2022August 2023Allow1310NoNo
17869647PROCESSING AUTHENTICATION REQUESTS FOR UNIFIED ACCESS MANAGEMENT SYSTEMS AND APPLICATIONS USING FREQUENTLY INVOKED POLICIESJuly 2022December 2025Allow4010YesNo
17783240CUSTOMIZED ANOMALY DETECTIONJune 2022October 2024Allow2820YesNo
17831131COMPUTER-BASED SYSTEM FOR ANALYZING AND QUANTIFYING CYBER THREAT PATTERNS AND METHODS OF USE THEREOFJune 2022April 2023Allow1100YesNo
17745476SYSTEMS AND METHODS FOR GRAPHICAL VISUALIZATION OF WEB APPLICATION VULNERABILITIESMay 2022February 2024Allow2120YesNo
17662591MULTIPLE APPLICATION AUTHENTICATIONMay 2022April 2024Allow2400YesNo
17739364DATA PROCESSING SYSTEMS FOR ASSESSING READINESS FOR RESPONDING TO PRIVACY-RELATED INCIDENTSMay 2022May 2024Allow2400YesNo
17755692PUBLIC KEY ENCRYPTION USING SELF POWERED TIMERSMay 2022October 2024Allow2900YesNo
17733039CALLBACK WITH A PIGGYBACK FUNCTION TO SET UP SECURITY CONTEXTApril 2022September 2025Allow4110YesNo
17709815PRESERVING CONFIDENTIALITY OF TENANTS IN CLOUD ENVIRONMENT WHEN DEPLOYING SECURITY SERVICESMarch 2022February 2024Allow2300YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner HAILU, TESHOME.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
37
Examiner Affirmed
24
(64.9%)
Examiner Reversed
13
(35.1%)
Reversal Percentile
56.5%
Higher than average

What This Means

With a 35.1% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
86
Allowed After Appeal Filing
31
(36.0%)
Not Allowed After Appeal Filing
55
(64.0%)
Filing Benefit Percentile
59.2%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 36.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner HAILU, TESHOME - Prosecution Strategy Guide

Executive Summary

Examiner HAILU, TESHOME works in Art Unit 2434 and has examined 805 patent applications in our dataset. With an allowance rate of 82.0%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 30 months.

Allowance Patterns

Examiner HAILU, TESHOME's allowance rate of 82.0% places them in the 54% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by HAILU, TESHOME receive 1.86 office actions before reaching final disposition. This places the examiner in the 44% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by HAILU, TESHOME is 30 months. This places the examiner in the 59% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +23.0% benefit to allowance rate for applications examined by HAILU, TESHOME. This interview benefit is in the 69% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 30.2% of applications are subsequently allowed. This success rate is in the 59% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 20.7% of cases where such amendments are filed. This entry rate is in the 26% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 42.9% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 39% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 61.5% of appeals filed. This is in the 39% percentile among all examiners. Of these withdrawals, 37.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 49.6% are granted (fully or in part). This grant rate is in the 46% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 1.7% of allowed cases (in the 73% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

    Relevant MPEP Sections for Prosecution Strategy

    • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
    • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
    • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
    • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
    • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
    • MPEP § 1214.07: Reopening prosecution after appeal

    Important Disclaimer

    Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

    No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

    Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

    Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.