USPTO Examiner ARYAL AAYUSH - Art Unit 2435

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18937243SECURE MODEL AGGREGATION METHOD AND APPARATUSNovember 2024February 2026Allow1500NoNo
18769501LOGOS AS VISUAL INDICATORS OF TRUST IN APPLICATIONSJuly 2024January 2026Allow1810NoNo
18767534COMMUNICATION METHOD, COMMUNICATION PROGRAM, AND AUTOMATIC TELLER MACHINEJuly 2024February 2026Allow2010NoNo
18720151A PROVISIONING CONTROL APPARATUS AND METHOD FOR PROVISIONING ELECTRONIC COMPONENTS OR DEVICESJune 2024March 2026Abandon2110NoNo
18740087SECURITY MEASURE METHOD AND SECURITY MEASURE SYSTEMJune 2024January 2026Allow1910YesNo
18648300ROBOTIC PROCESS AUTOMATION DRIVEN CONDITIONAL FORMATTING RULES FOR USER INTERFACESApril 2024March 2026Allow2210NoNo
18631512SYSTEM AND METHOD FOR TESTING NETWORK AND SECURITY DEVICES TO DETECT AND MITIGATE VULNERABILTIESApril 2024December 2025Allow2010NoNo
18602866ECDHE Key Exchange for Server Authentication and a Key ServerMarch 2024October 2024Allow710NoNo
18600245SECURE DATA COLLECTION FROM AN AIR-GAPPED NETWORKMarch 2024December 2024Allow910NoNo
18429749System and method for password expiration managementFebruary 2024December 2025Allow2310NoNo
18418462LCS TRUST SYSTEMJanuary 2024June 2025Allow1700NoNo
18395354SYSTEM AND METHOD FOR OPTIMIZED METRIC DISPLAYDecember 2023March 2026Allow2710NoNo
18393141THREAT DETECTION AND PREVENTION FOR INFORMATION SYSTEMSDecember 2023October 2024Allow910NoNo
18543323CONFIGURATION METHODDecember 2023October 2025Allow2210YesNo
18527062CENTRAL DATA PROTECTION AND PRIVACY FRAMEWORKDecember 2023January 2026Allow2610YesNo
18523689COMPUTING DEVICES AND METHODS FOR CONSTRUCTING TRUSTED CHAIN OF COMPUTING DEVICENovember 2023November 2025Allow2410NoNo
18523148SECURING ACCESS TO NETWORK DEVICES UTILIZING AUTHENTICATION AND DYNAMICALLY GENERATED TEMPORARY FIREWALL RULESNovember 2023January 2025Allow1410NoNo
18287810Forensics Module and Integrated SystemOctober 2023September 2025Allow2310YesNo
18283005SECURE SEARCH METHOD, SYSTEM THEREOF, APPARATUS THEREOF, ENCRYPTION APPARATUS, SEARCHER TERMINAL, AND PROGRAMSeptember 2023December 2025Allow2620NoNo
18468296COMPUTER DEVICE AND METHOD FOR CONTROLLING PROCESS COMPONENTSSeptember 2023October 2024Allow1310NoNo
18466119ENHANCED DATA SECURITY AND ACCESS CONTROL USING MACHINE LEARNINGSeptember 2023September 2024Allow1210NoNo
18242873DATA LIFECYCLE DISCOVERY AND MANAGEMENTSeptember 2023December 2025Allow2710NoNo
18454869PERIPHERAL DEVICE DATA PROTECTIONAugust 2023June 2025Allow2210NoNo
18234247PARTIAL PACKET ENCRYPTION FOR ENCRYPTED TUNNELSAugust 2023April 2024Allow910NoNo
18232249SYSTEM AND METHOD FOR GAMING WORKFLOW BETWEEN ENTITIES WITHIN A GAMING ENVIRONMENTAugust 2023November 2025Abandon2810NoNo
18264019DATA PROCESSING SYSTEMS AND METHODS FOR ANONYMIZING DATA SAMPLES IN CLASSIFICATION ANALYSISAugust 2023September 2025Allow2610NoNo
18362151INTEGRITY VALIDATION OF MANAGEMENT DEVICESJuly 2023November 2025Allow2810NoNo
18225080ANOMALY DETECTION IN REAL-TIME MULTI-THREADED PROCESSES ON EMBEDDED SYSTEMS AND DEVICES USING HARDWARE PERFORMANCE COUNTERS AND/OR STACK TRACESJuly 2023July 2024Allow1210NoNo
18210776ECDHE Key Exchange for Server Authentication and a Key ServerJune 2023February 2024Allow800NoNo
18327559HYBRID DEVICE WITH TRUSTED EXECUTION ENVIRONMENTJune 2023March 2025Allow2200NoNo
18196715ACCESS DECISION DEVICE, ACCESS DECISION METHOD AND COMPUTER READABLE MEDIUMMay 2023December 2025Abandon3120NoNo
18250266INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, MOBILE TERMINAL, AND INFORMATION PROCESSING SYSTEMApril 2023August 2025Allow2810NoNo
18032473COUNTERATTACK METHOD AGAINST HACKED NODE IN CAN BUS PHYSICAL LAYER, PHYSICAL LAYER SECURITY METHOD WITH CAN BUS NODE ID AUTO-SETTING, AND RECORDING MEDIUM AND SYSTEM FOR PERFORMING THE METHODApril 2023April 2025Allow2400NoNo
18031884SECURE COMPUTATION SYSTEM, SECURE COMPUTATION APPARATUS, SECURE COMPUTATION METHOD, AND PROGRAMApril 2023April 2025Allow2410YesNo
18030895HANDLING APPLICATION FUNCTIONS FOR KEY MANAGEMENT IN COMMUNICATION DEVICE-NETWORK RELAY SCENARIOSApril 2023June 2025Allow2600NoNo
18296615Determining Privacy Execution Actions based on Context Data Associated with a User DeviceApril 2023August 2025Allow2910YesNo
18189675APPLICATION-AWARE DCF DATA AUTHENTICATIONMarch 2023August 2025Allow2920NoNo
18181429GENERATING CRYPTOGRAPHIC SECURITY PARAMETERS RESPONSIVE TO CONDUCTIVE MESH-CAPTURED RADIANCESMarch 2023March 2025Allow2410NoNo
18175886KEY MANAGEMENT METHOD AND APPARATUSFebruary 2023June 2025Allow2710NoNo
18110271ADVANCED PERSISTENT THREAT DETECTIONFebruary 2023November 2025Allow3320YesNo
18005339A METHOD OF ATTESTING A STATE OF A COMPUTING ENVIRONMENTJanuary 2023October 2024Allow2100YesNo
18069906AUTO-TUNING OF RULE WEIGHTS IN PROFILESDecember 2022August 2023Allow810NoNo
17990968SECURING ACCESS TO NETWORK DEVICES UTILIZING AUTHENTICATION AND DYNAMICALLY GENERATED TEMPORARY FIREWALL RULESNovember 2022July 2023Allow810NoNo
18054441AUTHENTICATION USING A KNOWLEDGE FACTOR IDENTIFICATION TRANSACTION WITH CHALLENGE AUTHENTICATION TOKENNovember 2022February 2025Allow2710YesNo
17998052SECURE PLATFORM FOR THE DISSEMINATION OF DATANovember 2022September 2024Allow2310NoNo
18052085INTRUSION DETECTIONNovember 2022June 2024Allow1910YesNo
17970168METHODS AND SYSTEMS THAT MONITOR SYSTEM-CALL-INTEGRITYOctober 2022December 2024Allow2600NoNo
18045717Modular System Validation Platform for Computing DevicesOctober 2022November 2025Allow3720YesNo
17911338Method and Arrangement for Exchanging a Domain Registrar for Authenticating and Configuring Digital CertificatesSeptember 2022December 2024Allow2710NoNo
17885711LOGOS AS VISUAL INDICATORS OF TRUST IN APPLICATIONSAugust 2022June 2024Allow2210YesNo
17858568PERFORMING SECURITY FUNCTIONS USING DEVICES HAVING EMBEDDED HARDWARE SECURITY MODULESJuly 2022April 2025Allow3310NoNo
17855229SYSTEMS AND METHODS FOR PKI CERTIFICATE AND KEY ALLOCATIONS TO WIRELESS BASE STATION RADIO UNITSJune 2022April 2024Allow2200NoNo
17855261STATELESS AND LOW-OVERHEAD DOMAIN ISOLATION USING CRYPTOGRAPHIC COMPUTINGJune 2022October 2024Allow2800NoNo
17838446SYSTEMS AND METHODS FOR FLUSH PLUS RELOAD CACHE SIDE-CHANNEL ATTACK MITIGATIONJune 2022November 2024Allow2910YesNo
17749064INFORMATION PROCESSING DEVICE AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUMMay 2022July 2024Allow2610NoNo
17741862V2X VEHICULAR SECURE SERVICES REGISTRATIONMay 2022February 2026Abandon4620NoYes
17717954SECURE OPERATING SYSTEM UPDATEApril 2022February 2025Allow3420NoNo
17712395NO LATENCY HARDWARE INTERPOSERApril 2022July 2024Allow2710NoNo
17694058Process Control Software Security Architecture Based On Least PrivilegesMarch 2022July 2025Allow4010NoNo
17641884INFORMATION MATCHING SYSTEM AND INFORMATION MATCHING METHODMarch 2022July 2024Allow2910NoNo
17681483SYSTEM AND METHOD FOR SCALABLE STREAM ENCRYPTION AND DECRYPTIONFebruary 2022March 2025Allow3610NoNo
17560193HARDWARE OFFLOAD CIRCUITRYDecember 2021August 2024Allow3110YesNo
17557643SECURELY REDIRECTING SYSTEM SERVICE ROUTINESDecember 2021May 2024Allow2910NoNo
17554010SECURE ON-PREMISES TO CLOUD CONNECTOR FRAMEWORKDecember 2021July 2024Allow3110YesNo
17617932EMOTION RECOGNITION METHOD AND EMOTION RECOGNITION DEVICE USING SAMEDecember 2021September 2024Abandon3310NoNo
17546991ENFORCING LOCATION-BASED DATA PRIVACY RULES ACROSS NETWORKED WORKLOADSDecember 2021January 2024Allow2510NoNo
17539698PERFORMANCE MONITORING UNIT OF A PROCESSOR DETERRING TAMPERING OF COUNTER CONFIGURATION AND ENABLING VERIFIABLE DATA SAMPLINGDecember 2021June 2024Allow3100NoNo
17528019MACHINE LEARNING MODEL EVALUATION AND COMPARISONNovember 2021September 2024Allow3410NoNo
17399019UTILIZING DATA PROVENANCE TO DEFEND AGAINST DATA POISONING ATTACKSAugust 2021June 2024Abandon3420YesNo
17385375METHOD AND SYSTEM FOR MANAGING DATA PROTECTION FEATURE COMPATIBILITYJuly 2021March 2024Allow3100NoNo
17421719UPDATE DEVICE AND UPDATE METHODJuly 2021August 2023Allow2510YesNo
17364132TAMPER DETECTION SYSTEMS AND METHODS FOR ELECTRONIC DEVICES CARRIED BY MOBILE EQUIPMENTJune 2021March 2024Abandon3380YesYes
17362809PASSCODE AUTHENTICATION BASED DATA STORAGE DEVICEJune 2021March 2023Allow2110YesNo
17359551SECURING ACCESS TO NETWORK DEVICES UTILIZING TWO FACTOR AUTHENTICATION AND DYNAMICALLY GENERATED TEMPORARY FIREWALL RULESJune 2021August 2022Allow1400NoNo
17354794DETECTION OF SUPPLY CHAIN-RELATED SECURITY THREATS TO SOFTWARE APPLICATIONSJune 2021October 2023Allow2810YesNo
17304281METHOD, APPARATUS AND ELECTRONIC DEVICE FOR PROCESSING USER REQUEST AND STORAGE MEDIUMJune 2021July 2024Abandon3710NoNo
17349247EFFICIENT ENCRYPTION IN VPN SESSIONSJune 2021November 2024Allow4110NoNo
17341448CONFIGURATION DATA DELETION BASED ON TAMPER STATUSJune 2021October 2023Allow2920YesNo
17336700MANAGING INCOMPLIANCES IDENTIFIED AT INSTANCES OF CLOUD APPLICATIONSJune 2021October 2023Allow2800NoNo
17335156BINDING A TRUST ANCHOR AND AN ASICJune 2021July 2023Allow2510NoNo
17321899PREVENTION OF UNAUTHORIZED ACCESS TO INFORMATIONMay 2021August 2024Allow3910NoNo
17243999COGNITIVE TOKENS FOR AUTHORIZING RESTRICTED ACCESS FOR CYBER FORENSICSApril 2021August 2023Allow2800YesNo
17237213ELECTRONIC SYSTEM FOR DYNAMICALLY PERMITTING AND RESTRICTING ACCESS TO AND MODIFICATION OF COMPUTER RESOURCESApril 2021April 2023Allow2400YesNo
17231456THREAT DETECTION AND PREVENTION FOR INFORMATION SYSTEMSApril 2021December 2023Allow3220YesNo
17230767SECURE DATA COLLECTION FROM AN AIR-GAPPED NETWORKApril 2021December 2023Allow3220YesNo
17226304Automatic Assessment of API Service Security Standing with API Reputation ScoringApril 2021September 2023Allow3010NoNo
17198302METHODS AND DEVICES FOR GENERATING A SYMMETRIC SESSION KEY FOR ENCRYPTED COMMUNICATIONMarch 2021September 2023Allow3020NoNo
17184158COMPUTER DEVICE AND METHOD FOR CONTROLLING PROCESS COMPONENTSFebruary 2021June 2023Allow2810NoNo
17177126SYSTEM AND METHOD FOR PROTECTING A LOGIN PROCESSFebruary 2021September 2023Abandon3110NoNo
17165167COMPUTER RECOVERY SYSTEMFebruary 2021January 2024Allow3630YesNo
17143396SYSTEM, METHOD, AND COMPUTER-READABLE RECORDING MEDIUM OF CREATING, ACCESSING, AND RECOVERING A USER ACCOUNT WITH SINGLE SIGN ON PASSWORD HIDDEN AUTHENTICATIONJanuary 2021October 2023Allow3320NoNo
17135274Automatically Determining Storage System Data Breaches Using Machine Learning TechniquesDecember 2020July 2023Allow3110YesNo
17132248METHOD AND APPARATUS TO IDENTIFY HARDWARE PERFORMANCE COUNTER EVENTS FOR DETECTING AND CLASSIFYING MALWARE OR WORKLOAD USING ARTIFICIAL INTELLIGENCEDecember 2020June 2023Allow3010NoNo
17131684SCALABLE ATTESTATION FOR TRUSTED EXECUTION ENVIRONMENTSDecember 2020May 2024Allow4110NoNo
17127367DATA LIFECYCLE DISCOVERY AND MANAGEMENTDecember 2020June 2023Allow2910YesNo
17253560SYSTEMS AND METHODS FOR COMPUTER SECURITYDecember 2020January 2024Abandon3720NoNo
17253111An ECDHE Key Exchange for Server Authentication and a Key ServerDecember 2020February 2023Allow2610NoNo
17117295MAKING SECURITY RECOMMENDATIONSDecember 2020August 2023Allow3320YesNo
17114346SYSTEM, DEVICES AND/OR PROCESSES FOR SECURE COMPUTATIONDecember 2020January 2023Allow2610YesNo
17103581ENHANCED DATA SECURITY AND ACCESS CONTROL USING MACHINE LEARNINGNovember 2020June 2023Allow3111YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner ARYAL, AAYUSH.

Strategic Value of Filing an Appeal

Total Appeal Filings
1
Allowed After Appeal Filing
0
(0.0%)
Not Allowed After Appeal Filing
1
(100.0%)
Filing Benefit Percentile
3.6%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 0.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.

Strategic Recommendations

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner ARYAL, AAYUSH - Prosecution Strategy Guide

Executive Summary

Examiner ARYAL, AAYUSH works in Art Unit 2435 and has examined 60 patent applications in our dataset. With an allowance rate of 81.7%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 31 months.

Allowance Patterns

Examiner ARYAL, AAYUSH's allowance rate of 81.7% places them in the 53% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by ARYAL, AAYUSH receive 1.50 office actions before reaching final disposition. This places the examiner in the 26% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by ARYAL, AAYUSH is 31 months. This places the examiner in the 55% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +8.8% benefit to allowance rate for applications examined by ARYAL, AAYUSH. This interview benefit is in the 40% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 29.4% of applications are subsequently allowed. This success rate is in the 56% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 22.2% of cases where such amendments are filed. This entry rate is in the 29% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Petition Practice

When applicants file petitions regarding this examiner's actions, 200.0% are granted (fully or in part). This grant rate is in the 98% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

    Relevant MPEP Sections for Prosecution Strategy

    • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
    • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
    • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
    • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
    • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
    • MPEP § 1214.07: Reopening prosecution after appeal

    Important Disclaimer

    Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

    No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

    Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

    Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.