Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18937243 | SECURE MODEL AGGREGATION METHOD AND APPARATUS | November 2024 | February 2026 | Allow | 15 | 0 | 0 | No | No |
| 18769501 | LOGOS AS VISUAL INDICATORS OF TRUST IN APPLICATIONS | July 2024 | January 2026 | Allow | 18 | 1 | 0 | No | No |
| 18767534 | COMMUNICATION METHOD, COMMUNICATION PROGRAM, AND AUTOMATIC TELLER MACHINE | July 2024 | February 2026 | Allow | 20 | 1 | 0 | No | No |
| 18720151 | A PROVISIONING CONTROL APPARATUS AND METHOD FOR PROVISIONING ELECTRONIC COMPONENTS OR DEVICES | June 2024 | March 2026 | Abandon | 21 | 1 | 0 | No | No |
| 18740087 | SECURITY MEASURE METHOD AND SECURITY MEASURE SYSTEM | June 2024 | January 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18648300 | ROBOTIC PROCESS AUTOMATION DRIVEN CONDITIONAL FORMATTING RULES FOR USER INTERFACES | April 2024 | March 2026 | Allow | 22 | 1 | 0 | No | No |
| 18631512 | SYSTEM AND METHOD FOR TESTING NETWORK AND SECURITY DEVICES TO DETECT AND MITIGATE VULNERABILTIES | April 2024 | December 2025 | Allow | 20 | 1 | 0 | No | No |
| 18602866 | ECDHE Key Exchange for Server Authentication and a Key Server | March 2024 | October 2024 | Allow | 7 | 1 | 0 | No | No |
| 18600245 | SECURE DATA COLLECTION FROM AN AIR-GAPPED NETWORK | March 2024 | December 2024 | Allow | 9 | 1 | 0 | No | No |
| 18429749 | System and method for password expiration management | February 2024 | December 2025 | Allow | 23 | 1 | 0 | No | No |
| 18418462 | LCS TRUST SYSTEM | January 2024 | June 2025 | Allow | 17 | 0 | 0 | No | No |
| 18395354 | SYSTEM AND METHOD FOR OPTIMIZED METRIC DISPLAY | December 2023 | March 2026 | Allow | 27 | 1 | 0 | No | No |
| 18393141 | THREAT DETECTION AND PREVENTION FOR INFORMATION SYSTEMS | December 2023 | October 2024 | Allow | 9 | 1 | 0 | No | No |
| 18543323 | CONFIGURATION METHOD | December 2023 | October 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18527062 | CENTRAL DATA PROTECTION AND PRIVACY FRAMEWORK | December 2023 | January 2026 | Allow | 26 | 1 | 0 | Yes | No |
| 18523689 | COMPUTING DEVICES AND METHODS FOR CONSTRUCTING TRUSTED CHAIN OF COMPUTING DEVICE | November 2023 | November 2025 | Allow | 24 | 1 | 0 | No | No |
| 18523148 | SECURING ACCESS TO NETWORK DEVICES UTILIZING AUTHENTICATION AND DYNAMICALLY GENERATED TEMPORARY FIREWALL RULES | November 2023 | January 2025 | Allow | 14 | 1 | 0 | No | No |
| 18287810 | Forensics Module and Integrated System | October 2023 | September 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18283005 | SECURE SEARCH METHOD, SYSTEM THEREOF, APPARATUS THEREOF, ENCRYPTION APPARATUS, SEARCHER TERMINAL, AND PROGRAM | September 2023 | December 2025 | Allow | 26 | 2 | 0 | No | No |
| 18468296 | COMPUTER DEVICE AND METHOD FOR CONTROLLING PROCESS COMPONENTS | September 2023 | October 2024 | Allow | 13 | 1 | 0 | No | No |
| 18466119 | ENHANCED DATA SECURITY AND ACCESS CONTROL USING MACHINE LEARNING | September 2023 | September 2024 | Allow | 12 | 1 | 0 | No | No |
| 18242873 | DATA LIFECYCLE DISCOVERY AND MANAGEMENT | September 2023 | December 2025 | Allow | 27 | 1 | 0 | No | No |
| 18454869 | PERIPHERAL DEVICE DATA PROTECTION | August 2023 | June 2025 | Allow | 22 | 1 | 0 | No | No |
| 18234247 | PARTIAL PACKET ENCRYPTION FOR ENCRYPTED TUNNELS | August 2023 | April 2024 | Allow | 9 | 1 | 0 | No | No |
| 18232249 | SYSTEM AND METHOD FOR GAMING WORKFLOW BETWEEN ENTITIES WITHIN A GAMING ENVIRONMENT | August 2023 | November 2025 | Abandon | 28 | 1 | 0 | No | No |
| 18264019 | DATA PROCESSING SYSTEMS AND METHODS FOR ANONYMIZING DATA SAMPLES IN CLASSIFICATION ANALYSIS | August 2023 | September 2025 | Allow | 26 | 1 | 0 | No | No |
| 18362151 | INTEGRITY VALIDATION OF MANAGEMENT DEVICES | July 2023 | November 2025 | Allow | 28 | 1 | 0 | No | No |
| 18225080 | ANOMALY DETECTION IN REAL-TIME MULTI-THREADED PROCESSES ON EMBEDDED SYSTEMS AND DEVICES USING HARDWARE PERFORMANCE COUNTERS AND/OR STACK TRACES | July 2023 | July 2024 | Allow | 12 | 1 | 0 | No | No |
| 18210776 | ECDHE Key Exchange for Server Authentication and a Key Server | June 2023 | February 2024 | Allow | 8 | 0 | 0 | No | No |
| 18327559 | HYBRID DEVICE WITH TRUSTED EXECUTION ENVIRONMENT | June 2023 | March 2025 | Allow | 22 | 0 | 0 | No | No |
| 18196715 | ACCESS DECISION DEVICE, ACCESS DECISION METHOD AND COMPUTER READABLE MEDIUM | May 2023 | December 2025 | Abandon | 31 | 2 | 0 | No | No |
| 18250266 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, MOBILE TERMINAL, AND INFORMATION PROCESSING SYSTEM | April 2023 | August 2025 | Allow | 28 | 1 | 0 | No | No |
| 18032473 | COUNTERATTACK METHOD AGAINST HACKED NODE IN CAN BUS PHYSICAL LAYER, PHYSICAL LAYER SECURITY METHOD WITH CAN BUS NODE ID AUTO-SETTING, AND RECORDING MEDIUM AND SYSTEM FOR PERFORMING THE METHOD | April 2023 | April 2025 | Allow | 24 | 0 | 0 | No | No |
| 18031884 | SECURE COMPUTATION SYSTEM, SECURE COMPUTATION APPARATUS, SECURE COMPUTATION METHOD, AND PROGRAM | April 2023 | April 2025 | Allow | 24 | 1 | 0 | Yes | No |
| 18030895 | HANDLING APPLICATION FUNCTIONS FOR KEY MANAGEMENT IN COMMUNICATION DEVICE-NETWORK RELAY SCENARIOS | April 2023 | June 2025 | Allow | 26 | 0 | 0 | No | No |
| 18296615 | Determining Privacy Execution Actions based on Context Data Associated with a User Device | April 2023 | August 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 18189675 | APPLICATION-AWARE DCF DATA AUTHENTICATION | March 2023 | August 2025 | Allow | 29 | 2 | 0 | No | No |
| 18181429 | GENERATING CRYPTOGRAPHIC SECURITY PARAMETERS RESPONSIVE TO CONDUCTIVE MESH-CAPTURED RADIANCES | March 2023 | March 2025 | Allow | 24 | 1 | 0 | No | No |
| 18175886 | KEY MANAGEMENT METHOD AND APPARATUS | February 2023 | June 2025 | Allow | 27 | 1 | 0 | No | No |
| 18110271 | ADVANCED PERSISTENT THREAT DETECTION | February 2023 | November 2025 | Allow | 33 | 2 | 0 | Yes | No |
| 18005339 | A METHOD OF ATTESTING A STATE OF A COMPUTING ENVIRONMENT | January 2023 | October 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 18069906 | AUTO-TUNING OF RULE WEIGHTS IN PROFILES | December 2022 | August 2023 | Allow | 8 | 1 | 0 | No | No |
| 17990968 | SECURING ACCESS TO NETWORK DEVICES UTILIZING AUTHENTICATION AND DYNAMICALLY GENERATED TEMPORARY FIREWALL RULES | November 2022 | July 2023 | Allow | 8 | 1 | 0 | No | No |
| 18054441 | AUTHENTICATION USING A KNOWLEDGE FACTOR IDENTIFICATION TRANSACTION WITH CHALLENGE AUTHENTICATION TOKEN | November 2022 | February 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 17998052 | SECURE PLATFORM FOR THE DISSEMINATION OF DATA | November 2022 | September 2024 | Allow | 23 | 1 | 0 | No | No |
| 18052085 | INTRUSION DETECTION | November 2022 | June 2024 | Allow | 19 | 1 | 0 | Yes | No |
| 17970168 | METHODS AND SYSTEMS THAT MONITOR SYSTEM-CALL-INTEGRITY | October 2022 | December 2024 | Allow | 26 | 0 | 0 | No | No |
| 18045717 | Modular System Validation Platform for Computing Devices | October 2022 | November 2025 | Allow | 37 | 2 | 0 | Yes | No |
| 17911338 | Method and Arrangement for Exchanging a Domain Registrar for Authenticating and Configuring Digital Certificates | September 2022 | December 2024 | Allow | 27 | 1 | 0 | No | No |
| 17885711 | LOGOS AS VISUAL INDICATORS OF TRUST IN APPLICATIONS | August 2022 | June 2024 | Allow | 22 | 1 | 0 | Yes | No |
| 17858568 | PERFORMING SECURITY FUNCTIONS USING DEVICES HAVING EMBEDDED HARDWARE SECURITY MODULES | July 2022 | April 2025 | Allow | 33 | 1 | 0 | No | No |
| 17855229 | SYSTEMS AND METHODS FOR PKI CERTIFICATE AND KEY ALLOCATIONS TO WIRELESS BASE STATION RADIO UNITS | June 2022 | April 2024 | Allow | 22 | 0 | 0 | No | No |
| 17855261 | STATELESS AND LOW-OVERHEAD DOMAIN ISOLATION USING CRYPTOGRAPHIC COMPUTING | June 2022 | October 2024 | Allow | 28 | 0 | 0 | No | No |
| 17838446 | SYSTEMS AND METHODS FOR FLUSH PLUS RELOAD CACHE SIDE-CHANNEL ATTACK MITIGATION | June 2022 | November 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17749064 | INFORMATION PROCESSING DEVICE AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM | May 2022 | July 2024 | Allow | 26 | 1 | 0 | No | No |
| 17741862 | V2X VEHICULAR SECURE SERVICES REGISTRATION | May 2022 | February 2026 | Abandon | 46 | 2 | 0 | No | Yes |
| 17717954 | SECURE OPERATING SYSTEM UPDATE | April 2022 | February 2025 | Allow | 34 | 2 | 0 | No | No |
| 17712395 | NO LATENCY HARDWARE INTERPOSER | April 2022 | July 2024 | Allow | 27 | 1 | 0 | No | No |
| 17694058 | Process Control Software Security Architecture Based On Least Privileges | March 2022 | July 2025 | Allow | 40 | 1 | 0 | No | No |
| 17641884 | INFORMATION MATCHING SYSTEM AND INFORMATION MATCHING METHOD | March 2022 | July 2024 | Allow | 29 | 1 | 0 | No | No |
| 17681483 | SYSTEM AND METHOD FOR SCALABLE STREAM ENCRYPTION AND DECRYPTION | February 2022 | March 2025 | Allow | 36 | 1 | 0 | No | No |
| 17560193 | HARDWARE OFFLOAD CIRCUITRY | December 2021 | August 2024 | Allow | 31 | 1 | 0 | Yes | No |
| 17557643 | SECURELY REDIRECTING SYSTEM SERVICE ROUTINES | December 2021 | May 2024 | Allow | 29 | 1 | 0 | No | No |
| 17554010 | SECURE ON-PREMISES TO CLOUD CONNECTOR FRAMEWORK | December 2021 | July 2024 | Allow | 31 | 1 | 0 | Yes | No |
| 17617932 | EMOTION RECOGNITION METHOD AND EMOTION RECOGNITION DEVICE USING SAME | December 2021 | September 2024 | Abandon | 33 | 1 | 0 | No | No |
| 17546991 | ENFORCING LOCATION-BASED DATA PRIVACY RULES ACROSS NETWORKED WORKLOADS | December 2021 | January 2024 | Allow | 25 | 1 | 0 | No | No |
| 17539698 | PERFORMANCE MONITORING UNIT OF A PROCESSOR DETERRING TAMPERING OF COUNTER CONFIGURATION AND ENABLING VERIFIABLE DATA SAMPLING | December 2021 | June 2024 | Allow | 31 | 0 | 0 | No | No |
| 17528019 | MACHINE LEARNING MODEL EVALUATION AND COMPARISON | November 2021 | September 2024 | Allow | 34 | 1 | 0 | No | No |
| 17399019 | UTILIZING DATA PROVENANCE TO DEFEND AGAINST DATA POISONING ATTACKS | August 2021 | June 2024 | Abandon | 34 | 2 | 0 | Yes | No |
| 17385375 | METHOD AND SYSTEM FOR MANAGING DATA PROTECTION FEATURE COMPATIBILITY | July 2021 | March 2024 | Allow | 31 | 0 | 0 | No | No |
| 17421719 | UPDATE DEVICE AND UPDATE METHOD | July 2021 | August 2023 | Allow | 25 | 1 | 0 | Yes | No |
| 17364132 | TAMPER DETECTION SYSTEMS AND METHODS FOR ELECTRONIC DEVICES CARRIED BY MOBILE EQUIPMENT | June 2021 | March 2024 | Abandon | 33 | 8 | 0 | Yes | Yes |
| 17362809 | PASSCODE AUTHENTICATION BASED DATA STORAGE DEVICE | June 2021 | March 2023 | Allow | 21 | 1 | 0 | Yes | No |
| 17359551 | SECURING ACCESS TO NETWORK DEVICES UTILIZING TWO FACTOR AUTHENTICATION AND DYNAMICALLY GENERATED TEMPORARY FIREWALL RULES | June 2021 | August 2022 | Allow | 14 | 0 | 0 | No | No |
| 17354794 | DETECTION OF SUPPLY CHAIN-RELATED SECURITY THREATS TO SOFTWARE APPLICATIONS | June 2021 | October 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17304281 | METHOD, APPARATUS AND ELECTRONIC DEVICE FOR PROCESSING USER REQUEST AND STORAGE MEDIUM | June 2021 | July 2024 | Abandon | 37 | 1 | 0 | No | No |
| 17349247 | EFFICIENT ENCRYPTION IN VPN SESSIONS | June 2021 | November 2024 | Allow | 41 | 1 | 0 | No | No |
| 17341448 | CONFIGURATION DATA DELETION BASED ON TAMPER STATUS | June 2021 | October 2023 | Allow | 29 | 2 | 0 | Yes | No |
| 17336700 | MANAGING INCOMPLIANCES IDENTIFIED AT INSTANCES OF CLOUD APPLICATIONS | June 2021 | October 2023 | Allow | 28 | 0 | 0 | No | No |
| 17335156 | BINDING A TRUST ANCHOR AND AN ASIC | June 2021 | July 2023 | Allow | 25 | 1 | 0 | No | No |
| 17321899 | PREVENTION OF UNAUTHORIZED ACCESS TO INFORMATION | May 2021 | August 2024 | Allow | 39 | 1 | 0 | No | No |
| 17243999 | COGNITIVE TOKENS FOR AUTHORIZING RESTRICTED ACCESS FOR CYBER FORENSICS | April 2021 | August 2023 | Allow | 28 | 0 | 0 | Yes | No |
| 17237213 | ELECTRONIC SYSTEM FOR DYNAMICALLY PERMITTING AND RESTRICTING ACCESS TO AND MODIFICATION OF COMPUTER RESOURCES | April 2021 | April 2023 | Allow | 24 | 0 | 0 | Yes | No |
| 17231456 | THREAT DETECTION AND PREVENTION FOR INFORMATION SYSTEMS | April 2021 | December 2023 | Allow | 32 | 2 | 0 | Yes | No |
| 17230767 | SECURE DATA COLLECTION FROM AN AIR-GAPPED NETWORK | April 2021 | December 2023 | Allow | 32 | 2 | 0 | Yes | No |
| 17226304 | Automatic Assessment of API Service Security Standing with API Reputation Scoring | April 2021 | September 2023 | Allow | 30 | 1 | 0 | No | No |
| 17198302 | METHODS AND DEVICES FOR GENERATING A SYMMETRIC SESSION KEY FOR ENCRYPTED COMMUNICATION | March 2021 | September 2023 | Allow | 30 | 2 | 0 | No | No |
| 17184158 | COMPUTER DEVICE AND METHOD FOR CONTROLLING PROCESS COMPONENTS | February 2021 | June 2023 | Allow | 28 | 1 | 0 | No | No |
| 17177126 | SYSTEM AND METHOD FOR PROTECTING A LOGIN PROCESS | February 2021 | September 2023 | Abandon | 31 | 1 | 0 | No | No |
| 17165167 | COMPUTER RECOVERY SYSTEM | February 2021 | January 2024 | Allow | 36 | 3 | 0 | Yes | No |
| 17143396 | SYSTEM, METHOD, AND COMPUTER-READABLE RECORDING MEDIUM OF CREATING, ACCESSING, AND RECOVERING A USER ACCOUNT WITH SINGLE SIGN ON PASSWORD HIDDEN AUTHENTICATION | January 2021 | October 2023 | Allow | 33 | 2 | 0 | No | No |
| 17135274 | Automatically Determining Storage System Data Breaches Using Machine Learning Techniques | December 2020 | July 2023 | Allow | 31 | 1 | 0 | Yes | No |
| 17132248 | METHOD AND APPARATUS TO IDENTIFY HARDWARE PERFORMANCE COUNTER EVENTS FOR DETECTING AND CLASSIFYING MALWARE OR WORKLOAD USING ARTIFICIAL INTELLIGENCE | December 2020 | June 2023 | Allow | 30 | 1 | 0 | No | No |
| 17131684 | SCALABLE ATTESTATION FOR TRUSTED EXECUTION ENVIRONMENTS | December 2020 | May 2024 | Allow | 41 | 1 | 0 | No | No |
| 17127367 | DATA LIFECYCLE DISCOVERY AND MANAGEMENT | December 2020 | June 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17253560 | SYSTEMS AND METHODS FOR COMPUTER SECURITY | December 2020 | January 2024 | Abandon | 37 | 2 | 0 | No | No |
| 17253111 | An ECDHE Key Exchange for Server Authentication and a Key Server | December 2020 | February 2023 | Allow | 26 | 1 | 0 | No | No |
| 17117295 | MAKING SECURITY RECOMMENDATIONS | December 2020 | August 2023 | Allow | 33 | 2 | 0 | Yes | No |
| 17114346 | SYSTEM, DEVICES AND/OR PROCESSES FOR SECURE COMPUTATION | December 2020 | January 2023 | Allow | 26 | 1 | 0 | Yes | No |
| 17103581 | ENHANCED DATA SECURITY AND ACCESS CONTROL USING MACHINE LEARNING | November 2020 | June 2023 | Allow | 31 | 1 | 1 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner ARYAL, AAYUSH.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 0.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner ARYAL, AAYUSH works in Art Unit 2435 and has examined 60 patent applications in our dataset. With an allowance rate of 81.7%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 31 months.
Examiner ARYAL, AAYUSH's allowance rate of 81.7% places them in the 53% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by ARYAL, AAYUSH receive 1.50 office actions before reaching final disposition. This places the examiner in the 26% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by ARYAL, AAYUSH is 31 months. This places the examiner in the 55% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +8.8% benefit to allowance rate for applications examined by ARYAL, AAYUSH. This interview benefit is in the 40% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 29.4% of applications are subsequently allowed. This success rate is in the 56% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 22.2% of cases where such amendments are filed. This entry rate is in the 29% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants file petitions regarding this examiner's actions, 200.0% are granted (fully or in part). This grant rate is in the 98% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.