USPTO Examiner DADA BEEMNET W - Art Unit 2435

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18669396METHOD AND SYSTEM FOR GENERATING STATEFUL ATTACKSMay 2024April 2025Allow1110NoNo
18668279PARTIAL LIMITATION OF A MOBILE NETWORK DEVICEMay 2024April 2025Allow1120YesNo
18400166MODEL RUNNING METHODS AND APPARATUSESDecember 2023June 2025Allow1800YesNo
18544890RISK BASED REMOTE BROWSER ISOLATIONDecember 2023June 2025Allow1800NoNo
18572069BROADCAST ENCRYPTION WITH IMPROVED RESOURCE UTILIZATIONDecember 2023June 2025Allow1800YesNo
18542473TRANSPORTATION SECURITY APPARATUS, SYSTEM, AND METHOD TO ANALYZE IMAGES TO DETECT A THREAT CONDITIONDecember 2023May 2025Allow1720NoNo
18519555SYSTEMS AND METHODS FOR LINK DEVICE AUTHENTICATIONNovember 2023March 2025Allow1610YesNo
18520061ARTIFICIAL-INTELLIGENCE-ASSISTED CERTIFICATION SYSTEMNovember 2023June 2025Allow1900YesNo
18510894DATA PROCESSING SYSTEM WITH SECURE MEMORY SHARINGNovember 2023June 2025Allow1900YesNo
18487428DISTRIBUTED TRAINING USING ACTOR-CRITIC REINFORCEMENT LEARNING WITH OFF-POLICY CORRECTION FACTORSOctober 2023January 2025Allow1500NoNo
18284429ATTESTATION-AS-A-SERVICE FOR CONFIDENTIAL COMPUTINGSeptember 2023May 2025Allow1900NoNo
18283325SECURE WORKFLOWS THAT ENHANCE DATA SECURITYSeptember 2023May 2025Allow1900YesNo
18226161PATTERN MATCH-BASED DETECTION IN IOT SECURITYJuly 2023March 2025Allow2020YesNo
18225517LEARNING OF MALICIOUS BEHAVIOR VOCABULARY AND THREAT DETECTION THROUGH BEHAVIOR MATCHINGJuly 2023June 2024Allow1110NoNo
18353378METHODS AND SYSTEMS FOR PROCESSING DATA OF AN ANALYTICAL INSTRUMENT FOR ANALYZING BIOLOGICAL SAMPLESJuly 2023March 2025Allow2020NoNo
18352036SECURE NEIGHBORHOODS ASSESSMENT IN ENTERPRISE NETWORKSJuly 2023April 2025Allow2130NoNo
18260793METHOD FOR SECURING A MULTIPLE POINT MULTIPLICATION OPERATION AGAINST SIDE-CHANNEL ATTACKSJuly 2023April 2025Allow2100NoNo
18337785System and Method for Cybersecurity Threat Monitoring Using Dynamically-Updated Semantic GraphsJune 2023April 2024Allow1010NoNo
18210985SYSTEMS AND METHODS FOR ACCELERATED DETECTION AND REPLACEMENT OF ANOMALOUS MACHINE LEARNING-BASED ENSEMBLES AND INTELLIGENT GENERATION OF ANOMALOUS ARTIFACTS FOR ANOMALOUS ENSEMBLESJune 2023October 2023Allow410NoNo
18208204SAMPLE TRAFFIC BASED SELF-LEARNING MALWARE DETECTIONJune 2023April 2024Allow1010NoNo
18204171IDENTIFYING APPLICATIONS USING IMAGES GENERATED FROM NETWORK PACKETSMay 2023May 2024Allow1110NoNo
18201108ELECTRONIC INTERACTION AUTHENTICATION AND VERIFICATION, AND RELATED SYSTEMS, DEVICES, AND METHODSMay 2023March 2024Allow1000NoNo
18200382TENANT-AWARE DISTRIBUTED APPLICATION AUTHENTICATIONMay 2023October 2024Allow1620NoNo
18143943AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND AUTHENTICATION PROGRAMMay 2023June 2025Allow2510NoNo
18138995APPARATUS FOR GENERATING AN ACTION-BASED COLLECTIVEApril 2023September 2024Abandon1710NoNo
18133285SYSTEMS AND METHODS FOR INTELLIGENT CYBER SECURITY THREAT DETECTION AND MITIGATION THROUGH AN EXTENSIBLE AUTOMATED INVESTIGATIONS AND THREAT MITIGATION PLATFORMApril 2023June 2024Allow1410NoNo
18193385APPARATUS AND METHOD FOR E-MAIL BASED DIGITAL FOOTPRINT SANITIZATIONMarch 2023July 2023Allow410NoNo
18179376Data Breach Detection and MitigationMarch 2023March 2024Allow1210NoNo
18111478MANAGEMENT OF COLLABORATIVE CONTENT ITEM MODIFICATIONFebruary 2023September 2023Allow700NoNo
18097117SYSTEMS AND METHODS OF DETERMINING COMPROMISED IDENTITY INFORMATIONJanuary 2023November 2023Allow1010NoNo
18093486AUTOMATED AND ADAPTIVE MODEL-DRIVEN SECURITY SYSTEM AND METHOD FOR OPERATING THE SAMEJanuary 2023February 2025Allow2500NoNo
18149771DISTRIBUTED TRAINING USING ACTOR-CRITIC REINFORCEMENT LEARNING WITH OFF-POLICY CORRECTION FACTORSJanuary 2023July 2023Allow600NoNo
18147291COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR RECOVERING DATA IN CASE OF A COMPUTER NETWORK FAILUREDecember 2022December 2023Allow1210NoNo
18147468MALWARE DETECTION AND CONTENT ITEM RECOVERYDecember 2022March 2025Allow2710YesNo
18145184Automatic Transaction Processing FailoverDecember 2022January 2024Allow1210YesNo
18086349SYSTEMS AND METHODS FOR ALLOWING A USER TO DOWNLOAD A BLOCKED MEDIA ASSETDecember 2022July 2024Allow1940YesNo
17981169ENCRYPTION KEY MANAGEMENT FOR INTERNATIONAL DATA RESIDENCYNovember 2022May 2023Allow600NoNo
17963365SYSTEMS AND METHODS FOR ACCELERATED DETECTION AND REPLACEMENT OF ANOMALOUS MACHINE LEARNING-BASED DIGITAL THREAT SCORING ENSEMBLES AND INTELLIGENT GENERATION OF ANOMALOUS ARTIFACTS FOR ANOMALOUS ENSEMBLESOctober 2022March 2023Allow500NoNo
17955465COMPUTER-IMPLEMENTED METHOD AND ARRANGEMENT FOR CLASSIFYING ANOMALIESSeptember 2022September 2023Allow1110NoNo
17885092DATA MODEL TO ORGANIZE, GENERATE, AND SHARE DATA ABOUT AN OBJECT WITH MULTIPLE MEDIA FORMATS VIA VARIOUS PRESENTATION SYSTEMSAugust 2022July 2023Allow1120YesNo
17877888MULTI-TENANCY VIA CODE ENCAPSULATED IN SERVER REQUESTSJuly 2022June 2023Allow1020NoNo
17877811SAMPLE TRAFFIC BASED SELF-LEARNING MALWARE DETECTIONJuly 2022March 2023Allow710NoNo
17872996APPARATUS FOR GENERATING AN ACTION-BASED COLLECTIVEJuly 2022January 2023Allow600YesNo
17867975METHODS AND SYSTEMS FOR ACCESS CONTROL IN A COMPUTING SYSTEMJuly 2022February 2025Allow3110NoNo
17867572System on Chip with Pre-Exemption Interrupts for Partition Execution ControlJuly 2022October 2024Allow2710NoNo
17865154RANDOMIZATION OF ENCRYPTION OF FILE BLOCKSJuly 2022March 2025Abandon3210NoNo
17864878INTERACTIVE ACCESS TO HEADLESS CLUSTER MANAGERSJuly 2022February 2025Allow3110YesNo
17864940SYSTEM FOR ESTABLISHING SECURE COMMUNICATION CHANNELS FOR PERIPHERAL HARDWARE DEVICESJuly 2022August 2024Allow2500YesNo
17861445METHODS FOR PROTECTING COMPUTER HARDWARE FROM CYBER THREATSJuly 2022July 2024Allow2401YesNo
17848629SECURITY CONTROL FOR ELECTRONIC CONTROL UNITJune 2022February 2024Allow2000YesNo
17846281AUTHENTICATION USING MAGNETIC FIELD BASED ON CURRENT DRAWN BY SECURITY DEVICEJune 2022September 2024Allow2710NoNo
17846363SECURE PROCESSOR, OPERATING METHOD THEREOF, AND STORAGE DEVICE INCLUDING SAMEJune 2022March 2024Allow2100NoNo
17845383PROCESSING ANOMALY DATA TO IDENTIFY NETWORK SECURITY THREATS BY USE OF RARITY ANALYSISJune 2022July 2023Allow1200NoNo
17838051SYSTEMS AND METHODS FOR AN ADAPTIVE SAMPLING OF UNLABELED DATA SAMPLES FOR CONSTRUCTING AN INFORMATIVE TRAINING DATA CORPUS THAT IMPROVES A TRAINING AND PREDICTIVE ACCURACY OF A MACHINE LEARNING MODELJune 2022August 2022Allow200NoNo
17836892Logical Validation of Devices Against Fraud and TamperingJune 2022November 2024Allow3020YesNo
17831606PIXEL STREAMED NFT-BASED LIVING ARTWORK AND QUEUE-BASED LIVE EVENT VIEWINGJune 2022November 2022Allow610NoNo
17749386APPARATUS AND METHOD FOR PROVIDING SECURE EXECUTION ENVIRONMENT FOR NPUMay 2022March 2024Allow2200NoNo
17744507TRANSPORTATION SECURITY APPARATUS, SYSTEM, AND METHOD TO ANALYZE IMAGES TO DETECT A THREAT CONDITIONMay 2022August 2023Allow1510NoNo
17742643SYSTEMS AND METHODS FOR ALLOWING A USER TO ACCESS BLOCKED MEDIAMay 2022January 2024Allow2020NoNo
17724954LABELING METHOD, APPARATUS, AND DEVICE, AND READABLE STORAGE MEDIUMApril 2022April 2024Allow2300NoNo
17722294APPLICATION ACCESS LOGGERApril 2022August 2024Allow2810NoNo
17716030Machine Learning Methods And Systems For Developing Security Governance RecommendationsApril 2022June 2023Allow1530YesNo
17714427UNIQUE TOKEN AUTHENTICATION VERIFICATION VALUEApril 2022August 2024Allow2820YesNo
17709201WIRELESS SHARED OMNIBUS ACCESS CONTROL METHOD AND SYSTEMMarch 2022April 2024Allow2400NoNo
17707482SYSTEM AND METHOD FOR AUTONOMOUS SOFTWARE LICENSING DURING BOOTUP PROCESSMarch 2022April 2024Allow2400YesNo
17683236SHARING AUTHENTICATION BETWEEN APPLICATIONSFebruary 2022February 2023Allow1200NoNo
17680807System and Method for Digital Imaging and Communications in Security Standard Compliance ValidationFebruary 2022April 2024Allow2500NoNo
17638694USING SECURE ENCLAVES AND DYNAMIC MEASUREMENTSFebruary 2022May 2024Allow2610NoNo
17677169DYNAMIC DISPLAY CONTROL APPLICATION FOR CONTROLLING GRAPHICAL USER INTERFACE ELEMENTS BASED ON ACTIVITY DATAFebruary 2022August 2023Abandon1810NoNo
17676797ARTIFICIAL INTELLIGENCE-BASED GENERATION OF ANTHROPOMORPHIC SIGNATURES AND USE THEREOFFebruary 2022June 2023Allow1610YesNo
17676183METHOD AND SYSTEM FOR GENERATING STATEFUL ATTACKSFebruary 2022January 2024Allow2310NoNo
17672140SYSTEMS AND METHODS FOR INTELLIGENT CYBER SECURITY THREAT DETECTION AND MITIGATION THROUGH AN EXTENSIBLE AUTOMATED INVESTIGATIONS AND THREAT MITIGATION PLATFORMFebruary 2022February 2023Allow1220NoNo
17668965CYPHERGENICS-BASED DECODING AND ENCODING OF PROGRAM DATAFebruary 2022June 2022Allow400NoNo
17665826METHODS AND DEVICES FOR SECURE APPLICATION AUTHENTICATION USING A ONE-WAY ENCRYPTED AUTHENTICATION TOKENFebruary 2022September 2024Allow3120YesNo
17555125POLICY DRIVEN VULNERABILITY IDENTIFICATION AND REMEDIATIONDecember 2021October 2024Allow3410NoNo
17551558PROTECTING SOFTWARE SUPPLY CHAIN USING SECURE LOG GENERATED IN A TRUSTED BUILD ENVIRONMENTDecember 2021October 2024Allow3420NoNo
17551076COMPUTER-BASED PLATFORMS OR SYSTEMS, COMPUTING DEVICES OR COMPONENTS AND/OR COMPUTING METHODS FOR TECHNOLOGICAL APPLICATIONS INVOLVING PROVISION OF A PORTAL FOR MANAGING USER ACCOUNTS HAVING A LOGIN PORTAL CONFIGURED TO DEFEND AGAINST CREDENTIAL REPLAY ATTACKSDecember 2021January 2023Allow1310NoNo
17549147SYSTEM AND METHOD FOR CYBERSECURITY THREAT MONITORING USING DYNAMICALLY-UPDATED SEMANTIC GRAPHSDecember 2021March 2023Allow1510NoNo
17548776METHOD AND SYSTEM WITH MULTIPLE HETEROGENEOUS TEE IMPLEMENTATIONSDecember 2021January 2024Allow2510NoNo
17546800PIXEL STREAMED NFT-BASED LIVING ARTWORK AND QUEUE-BASED LIVE EVENT VIEWINGDecember 2021June 2022Allow620YesNo
17547084ACHIEVING MINIMUM TRUSTWORTHINESS IN DISTRIBUTED WORKLOADSDecember 2021August 2023Allow2000YesNo
17539334Methods and Systems for Implementing Automated Controls Assessment in Computer SystemsDecember 2021March 2023Allow1510NoNo
17610423INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAMNovember 2021October 2023Allow2300NoNo
17516247TRUSTED EXECUTION BROKERNovember 2021December 2023Allow2510YesNo
17512919PROTECTION METHOD, COMPUTER PROGRAM PRODUCT AND ASSOCIATED SYSTEMSOctober 2021September 2024Allow3420NoNo
17506607INTRUSION DETECTION METHOD AND SYSTEM FOR INTERNET OF VEHICLES BASED ON SPARK AND COMBINED DEEP LEARNINGOctober 2021June 2022Allow800YesNo
17499379NETWORKING DATA ANALYSIS IN A VISUAL SPREADSHEETOctober 2021April 2022Allow600NoNo
17494960SYSTEMS AND METHODS FOR LINK DEVICE AUTHENTICATIONOctober 2021August 2023Allow2210YesNo
17489913SYSTEMS AND METHODS FOR TRAFFIC MONITORING WITH IMPROVED PRIVACY PROTECTIONSSeptember 2021January 2024Allow2710NoNo
17488800SYSTEMS AND METHODS FOR INTELLIGENT CYBER SECURITY THREAT DETECTION AND MITIGATION THROUGH AN EXTENSIBLE AUTOMATED INVESTIGATIONS AND THREAT MITIGATION PLATFORMSeptember 2021January 2022Allow400YesNo
17449343Secure Public Cloud with Protected Guest-Verified Host ControlSeptember 2021June 2023Allow2120NoNo
17488614RAPID IDENTIFICATION OF MESSAGE AUTHENTICATIONSeptember 2021January 2024Allow2710NoNo
17487827DYNAMIC DISPLAY CONTROL APPLICATION FOR CONTROLLING GRAPHICAL USER INTERFACE ELEMENTS BASED ON ACTIVITY DATASeptember 2021December 2021Allow300NoNo
17486483Automatic In-Store Subscriber Device Detection and ProcessingSeptember 2021October 2023Allow2400NoNo
17482154IDENTIFYING NETWORK APPLICATIONS USING IMAGES GENERATED FROM PAYLOAD DATA AND TIME DATASeptember 2021February 2023Allow1710NoNo
17481898Graphical User Interface and Operator Console Management System for Distributed Terminal NetworkSeptember 2021August 2022Abandon1110NoNo
17480052IMPLEMENTING HIERARCHICAL CYBERSECURITY SYSTEMS AND METHODSSeptember 2021February 2023Allow1710NoNo
17472244METHOD, SYSTEM AND COMPUTER PROGRAM FOR COMPARING IMAGESSeptember 2021March 2024Abandon3010NoNo
17466718TRACKING OF USER LOGIN SESSIONSSeptember 2021March 2024Allow3010YesNo
17310927METHOD OF BLOCKING ACCESS OF THREATENING USER AND PROGRAM SECURITY APPLICATION METHODAugust 2021August 2024Allow3511NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner DADA, BEEMNET W.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
32
Examiner Affirmed
22
(68.8%)
Examiner Reversed
10
(31.2%)
Reversal Percentile
47.2%
Lower than average

What This Means

With a 31.2% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
75
Allowed After Appeal Filing
24
(32.0%)
Not Allowed After Appeal Filing
51
(68.0%)
Filing Benefit Percentile
46.5%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 32.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner DADA, BEEMNET W - Prosecution Strategy Guide

Executive Summary

Examiner DADA, BEEMNET W works in Art Unit 2435 and has examined 1,066 patent applications in our dataset. With an allowance rate of 87.6%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 25 months.

Allowance Patterns

Examiner DADA, BEEMNET W's allowance rate of 87.6% places them in the 63% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by DADA, BEEMNET W receive 1.48 office actions before reaching final disposition. This places the examiner in the 35% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by DADA, BEEMNET W is 25 months. This places the examiner in the 66% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +15.4% benefit to allowance rate for applications examined by DADA, BEEMNET W. This interview benefit is in the 59% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 33.1% of applications are subsequently allowed. This success rate is in the 64% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 40.5% of cases where such amendments are filed. This entry rate is in the 54% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 80.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 60% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 65.2% of appeals filed. This is in the 40% percentile among all examiners. Of these withdrawals, 41.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 35.2% are granted (fully or in part). This grant rate is in the 30% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 3.2% of allowed cases (in the 84% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Examiner cooperation: This examiner frequently makes examiner's amendments to place applications in condition for allowance. If you are close to allowance, the examiner may help finalize the claims.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.