Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18795239 | MACHINE LEARNED ALERT CLASSIFICATION SYSTEM | August 2024 | December 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18664809 | AGGREGATING ENCRYPTED NETWORK VALUES | May 2024 | January 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18650200 | Insight Generation Using Personal Identifiable Information (PII) Footprint Modeling | April 2024 | September 2024 | Allow | 5 | 0 | 0 | Yes | No |
| 18646114 | SECURITY POLICIES FOR SOFTWARE CALL STACKS | April 2024 | December 2024 | Allow | 8 | 1 | 0 | Yes | No |
| 18525260 | METHOD & APPARATUS FOR AN ULTRA LOW POWER VLSI IMPLEMENTATION OF THE 128-BIT AES ALGORITHM USING A NOVEL APPROACH TO THE SHIFTROW TRANSFORMATION | November 2023 | November 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18489391 | SYSTEMS AND METHODS FOR MANAGEMENT OF DATA ANALYTICS PLATFORMS USING METADATA | October 2023 | March 2025 | Allow | 16 | 2 | 0 | Yes | No |
| 18226908 | Settings Optimization Engine Using Artificial Intelligence To Enhance Client Privacy | July 2023 | March 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18195435 | DYNAMIC TIME-BASED DATA ACCESS POLICY DEFINITION AND ENFORCEMENT | May 2023 | February 2026 | Allow | 33 | 1 | 0 | Yes | No |
| 18306450 | METHOD AND SYSTEM FOR BEHAVIOR-BASED AUTHENTICATION OF A USER | April 2023 | May 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18139290 | STEP-UP AUTHENTICATION CONDITIONED ON RISK SCORE EXPLAINABILITY | April 2023 | September 2025 | Abandon | 29 | 1 | 0 | No | No |
| 18043186 | SYSTEM AND METHOD FOR PRIVACY-PRESERVING DISTRIBUTED TRAINING OF NEURAL NETWORK MODELS ON DISTRIBUTED DATASETS | February 2023 | August 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 18158145 | TIME-DELAY-BASED ACCESS CONTROL FOR CONTINUOUS INTEGRATION PIPELINES | January 2023 | March 2026 | Allow | 38 | 3 | 0 | Yes | No |
| 18097620 | METHOD FOR PROVIDING REMOTE SECURITY SERVICE AND SERVER PERFORMING THE SAME | January 2023 | February 2026 | Abandon | 37 | 2 | 0 | No | No |
| 18047323 | User credential authentication using blockchain and machine learning | October 2022 | January 2026 | Allow | 39 | 2 | 0 | Yes | No |
| 17937258 | ENCRYPTED PROCESSING UNIT EMULATED WITH HOMOMORPHIC ENCRYPTION CIRCUITS | September 2022 | July 2025 | Abandon | 33 | 2 | 0 | No | No |
| 17952195 | VEHICLE TEMPORARY CERTIFICATE AUTHENTICATION | September 2022 | May 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 17949159 | SYSTEMS AND METHODS FOR RUNNING MULTIPLE LOGICAL SECURE ELEMENTS ON THE SAME SECURE HARDWARE | September 2022 | September 2025 | Allow | 36 | 2 | 0 | Yes | No |
| 17899653 | SoC ARCHITECTURE AND DATA PROTECTION METHOD THEREOF | August 2022 | September 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17893914 | SYSTEMS AND METHODS FACILITATING INTERACTIONS BETWEEN IMPOSTER DEVICES AND PROTECTED CONTENT SYSTEMS | August 2022 | February 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17741943 | SYSTEMS AND METHODS FOR DYNAMIC VULNERABILITY SCORING | May 2022 | October 2025 | Allow | 41 | 3 | 0 | Yes | No |
| 17680737 | AUTO-SWITCHING CONTENT BETWEEN DEVICES BASED ON MEETING CONDITIONS | February 2022 | August 2025 | Abandon | 41 | 2 | 0 | Yes | No |
| 17636919 | RESTRICTED FULLY PRIVATE CONJUCTIVE DATABASE QUERY FOR PROTECTION OF USER PRIVACY AND IDENTITY | February 2022 | September 2025 | Allow | 43 | 2 | 0 | Yes | No |
| 17648265 | SYSTEM AND METHOD CAPABLE OF UPLOADING DATA INTO BLOCKCHAIN | January 2022 | November 2024 | Abandon | 34 | 1 | 0 | No | No |
| 17495944 | BLUETOOTH PERIPHERAL AND CENTRAL APPARATUSES AND VERIFICATION METHOD | October 2021 | August 2024 | Abandon | 34 | 1 | 0 | No | No |
| 17420862 | ON-VEHICLE COMMUNICATION SYSTEM, ON-VEHICLE COMMUNICATION CONTROL DEVICE, ON-VEHICLE COMMUNICATION DEVICE, COMMUNICATION CONTROL METHOD AND COMMUNICATION METHOD | July 2021 | November 2024 | Abandon | 41 | 2 | 0 | Yes | No |
| 17418469 | AGGREGATING ENCRYPTED NETWORK VALUES | June 2021 | March 2024 | Allow | 33 | 1 | 0 | Yes | No |
| 17307553 | SECURE DATA ANALYTICS | May 2021 | November 2024 | Allow | 43 | 3 | 0 | Yes | No |
| 17232577 | Insight Generation Using Personal Identifiable Information (PII) Footprint Modeling | April 2021 | March 2024 | Allow | 35 | 1 | 0 | No | No |
| 17228946 | STORAGE ARRAY DATA DECRYPTION | April 2021 | September 2024 | Allow | 41 | 4 | 0 | Yes | No |
| 17282601 | LOW LATENCY CALCULATION TRANSCRYPTION METHOD | April 2021 | August 2024 | Allow | 40 | 2 | 0 | Yes | No |
| 17217326 | POST-QUANTUM CRYPTOGRAPHY SECURED EXECUTION ENVIRONMENTS FOR EDGE DEVICES | March 2021 | March 2025 | Allow | 48 | 5 | 0 | Yes | No |
| 17217024 | PLATFORM FOR UNSUPERVISED MACHINE LEARNING TRAINING ON UNSEEABLE USER GENERATED ASSETS | March 2021 | August 2024 | Allow | 40 | 3 | 0 | Yes | No |
| 17196640 | PARTICIPANT-MANAGED, INDEPENDENT-TRUST AUTHENTICATION SERVICE FOR SECURE MESSAGING | March 2021 | October 2023 | Allow | 31 | 2 | 0 | Yes | No |
| 17183499 | System and Method for Providing a Secure, Collaborative, and Distributed Computing Environment as well as a Repository for Secure Data Storage and Sharing | February 2021 | February 2024 | Abandon | 36 | 2 | 0 | No | No |
| 17167535 | INFORMATION PROCESSING METHOD, INFORMATION DISPLAY METHOD, NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM, TERMINAL AND SERVER | February 2021 | March 2025 | Abandon | 50 | 3 | 0 | Yes | No |
| 17136522 | ARTIFICIAL INTELLIGENCE CALCULATION SEMICONDUCTOR DEVICE AND STORAGE DEVICE COMPRISING THE SAME | December 2020 | September 2023 | Allow | 33 | 2 | 0 | Yes | No |
| 17129081 | IDENTIFYING AND PREVENTING ACCESS TO AGGREGATE PII FROM ANONYMIZED DATA | December 2020 | March 2024 | Abandon | 39 | 3 | 0 | Yes | No |
| 17122734 | REAL TIME APPLICATION PROTECTION SYSTEM CONFIGURATION DEFICIENCY PREDICTION | December 2020 | August 2024 | Allow | 44 | 4 | 0 | Yes | No |
| 17115197 | AUTOMATED LOG/EVENT-MESSAGE MASKING IN A DISTRIBUTED LOG-ANALYTICS SYSTEM | December 2020 | December 2024 | Abandon | 48 | 3 | 0 | No | Yes |
| 17113464 | MACHINE LEARNING BASED VULNERABLE TARGET IDENTIFICATION IN RANSOMWARE ATTACK | December 2020 | September 2024 | Allow | 45 | 3 | 0 | Yes | No |
| 17110369 | FEDERATED PRIVATE ADVERSARIAL TRAINING | December 2020 | August 2024 | Allow | 44 | 3 | 0 | Yes | No |
| 17107324 | APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR PRIVACY-PRESERVING PERSONALIZED DATA SEARCHING AND PRIVACY-PRESERVING PERSONALIZED DATA SEARCH TRAINING | November 2020 | September 2023 | Abandon | 33 | 1 | 0 | No | No |
| 17107299 | APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR PRIVACY-PRESERVING PERSONALIZED DATA SEARCHING AND PRIVACY-PRESERVING PERSONALIZED DATA SEARCH TRAINING | November 2020 | April 2024 | Abandon | 41 | 2 | 0 | No | No |
| 17057893 | BIOMETRIC ENROLMENT | November 2020 | January 2024 | Allow | 38 | 1 | 0 | No | No |
| 16953409 | SECURE RE-ENCRYPTION OF HOMOMORPHICALLY ENCRYPTED DATA | November 2020 | December 2023 | Allow | 37 | 3 | 0 | Yes | No |
| 17100718 | TECHNIQUES FOR PREVENTING MALICIOUS USE OF BIOMETRIC DATA | November 2020 | December 2023 | Allow | 36 | 2 | 0 | Yes | No |
| 17097067 | Providing Network Security Using a Network Data Analytic Function | November 2020 | November 2023 | Abandon | 36 | 2 | 0 | Yes | No |
| 17094670 | UTILIZING MACHINE LEARNING MODELS TO DETERMINE CUSTOMER CARE ACTIONS FOR TELECOMMUNICATIONS NETWORK PROVIDERS | November 2020 | April 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17088644 | MACHINE LEARNED ALERT TRIAGE CLASSIFICATION SYSTEM | November 2020 | April 2024 | Allow | 42 | 3 | 0 | Yes | No |
| 16949411 | METHODS AND SYSTEMS FOR PROCESSING AGENCY-INITIATED PRIVACY REQUESTS | October 2020 | May 2024 | Allow | 42 | 3 | 0 | Yes | No |
| 17079992 | SECURE APPLICATION EXECUTION IN A DATA PROCESSING SYSTEM | October 2020 | June 2023 | Allow | 32 | 2 | 0 | Yes | No |
| 17078176 | ARTIFICIAL INTELLIGENCE SECURITY CONFIGURATION ENGINE | October 2020 | October 2023 | Allow | 35 | 2 | 0 | Yes | No |
| 17066550 | SYSTEMS AND METHODS FOR SECURE AND FAST MACHINE LEARNING INFERENCE IN A TRUSTED EXECUTION ENVIRONMENT | October 2020 | January 2023 | Abandon | 28 | 1 | 0 | No | No |
| 17067152 | ELECTRONIC APPARATUS AND CONTROL METHOD THEREOF | October 2020 | May 2024 | Allow | 44 | 4 | 0 | Yes | No |
| 17035375 | SYSTEMS AND METHODS FOR TRIAGING SOFTWARE VULNERABILITIES | September 2020 | September 2023 | Allow | 36 | 2 | 0 | Yes | No |
| 17030785 | CONTROL FLOW PROTECTION BASED ON PHANTOM ADDRESSING | September 2020 | December 2023 | Allow | 38 | 2 | 0 | Yes | No |
| 17023035 | SECURITY POLICIES FOR SOFTWARE CALL STACKS | September 2020 | March 2024 | Allow | 42 | 4 | 0 | Yes | No |
| 17011776 | SYSTEMS AND METHODS FOR MANAGEMENT OF DATA ANALYTICS PLATFORMS USING METADATA | September 2020 | August 2023 | Allow | 35 | 2 | 0 | Yes | No |
| 17002812 | DELETING CONTENT FROM TEMPORARY MEMORY | August 2020 | June 2024 | Abandon | 46 | 4 | 0 | Yes | No |
| 16997728 | USING MACHINE LEARNING TO BYPASS ACTIVITIES OF A SECURE DOCUMENT WORKFLOW BASED ON RECIPIENT PROFILE | August 2020 | September 2024 | Abandon | 49 | 5 | 0 | Yes | No |
| 16936413 | Runtime Signature Integrity | July 2020 | June 2023 | Abandon | 34 | 1 | 0 | No | No |
| 16926322 | AUTOMATED CLASSIFICATION OF NETWORK DEVICES TO PROTECTION GROUPS | July 2020 | March 2024 | Allow | 44 | 4 | 0 | Yes | No |
| 16897394 | Settings Optimization Engine Using Artificial Intelligence To Enhance Client Privacy | June 2020 | May 2023 | Allow | 35 | 1 | 0 | Yes | No |
| 16845556 | Method and Apparatus for an Ultra Low Power VLSI Implementation of the 128-Bit AES Algorithm Using a Novel Approach to the Shiftrow Transformation | April 2020 | July 2023 | Allow | 39 | 2 | 0 | Yes | No |
| 16794505 | METHOD, ELECTRONIC DEVICE AND COMPUTER PROGRAM PRODUCT FOR DETECTING ABNORMAL NETWORK REQUEST | February 2020 | April 2024 | Abandon | 50 | 4 | 0 | No | No |
| 16573813 | Non-Interactive Private Decision Tree Evaluation | September 2019 | March 2024 | Allow | 54 | 5 | 0 | Yes | No |
| 16551839 | AI-BASED BLOCKCHAIN HYBRID CONSENSUS | August 2019 | October 2022 | Allow | 38 | 1 | 0 | Yes | No |
| 16457324 | SECURE UPDATING OF COMPUTING SYSTEM FIRMWARE | June 2019 | March 2023 | Abandon | 45 | 2 | 0 | No | No |
| 16470832 | METHOD AND SYSTEM FOR BEHAVIOR-BASED AUTHENTICATION OF A USER | June 2019 | June 2023 | Abandon | 47 | 2 | 0 | No | No |
| 16415125 | Searching Over Encrypted Model and Encrypted Data Using Secure Single-and Multi-Party Learning Based on Encrypted Data | May 2019 | August 2024 | Allow | 60 | 5 | 0 | Yes | No |
| 16416039 | TRANSIENT KEY NEGOTIATION FOR PASSENGER ACCESSIBLE PERIPHERALS | May 2019 | December 2025 | Abandon | 60 | 4 | 0 | No | Yes |
| 16294467 | CLASSIFYING COMPARATORS BASED ON COMPARATOR OFFSETS | March 2019 | June 2024 | Allow | 60 | 4 | 0 | Yes | No |
| 15964536 | HIGH-THROUGHPUT PRIVACY-FRIENDLY HARDWARE ASSISTED MACHINE LEARNING ON EDGE NODES | April 2018 | February 2024 | Abandon | 60 | 5 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner CARNES, THOMAS A.
With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 0.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner CARNES, THOMAS A works in Art Unit 2436 and has examined 50 patent applications in our dataset. With an allowance rate of 64.0%, this examiner allows applications at a lower rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 41 months.
Examiner CARNES, THOMAS A's allowance rate of 64.0% places them in the 24% percentile among all USPTO examiners. This examiner is less likely to allow applications than most examiners at the USPTO.
On average, applications examined by CARNES, THOMAS A receive 2.66 office actions before reaching final disposition. This places the examiner in the 78% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by CARNES, THOMAS A is 41 months. This places the examiner in the 21% percentile for prosecution speed. Applications take longer to reach final disposition with this examiner compared to most others.
Conducting an examiner interview provides a +65.7% benefit to allowance rate for applications examined by CARNES, THOMAS A. This interview benefit is in the 98% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 27.6% of applications are subsequently allowed. This success rate is in the 48% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.
This examiner enters after-final amendments leading to allowance in 9.1% of cases where such amendments are filed. This entry rate is in the 9% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 8% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 0.0% of appeals filed. This is in the 1% percentile among all examiners. Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.
When applicants file petitions regarding this examiner's actions, 200.0% are granted (fully or in part). This grant rate is in the 98% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.