USPTO Examiner LEE MICHAEL M - Art Unit 2436

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18768558DATA TOKENIZATION AND SEARCH IN A DISTRIBUTED NETWORKJuly 2024July 2025Allow1210NoNo
18663340AUTOMATIC INLINE DETECTION BASED ON STATIC DATAMay 2024June 2025Allow1310YesNo
18609291DEOBFUSCATING AND DECLOAKING WEB-BASED MALWARE WITH ABSTRACT EXECUTIONMarch 2024June 2025Allow1510YesNo
18599969Detecting Separate Login During Action Based Knowledge-Based Authentication and Disqualifying ValidityMarch 2024November 2024Allow800YesNo
18525710SYSTEM EVENT DETECTION SYSTEM AND METHODNovember 2023April 2025Allow1720YesNo
18372888AUTHENTICATION AS A SERVICESeptember 2023October 2024Allow1310YesNo
18370073Rule-Based Network-Threat Detection For Encrypted CommunicationsSeptember 2023November 2023Allow100YesNo
18244280SECURE DISTRIBUTION OF DIGITAL ASSETS WITHIN A COMPUTING ENVIRONMENT USING PERMISSIONED DISTRIBUTED LEDGERSSeptember 2023October 2024Allow1310YesNo
18226775USE OF STATELESS MARKING TO SPEED UP STATEFUL FIREWALL RULE PROCESSINGJuly 2023March 2025Allow2020YesNo
18353115Malicious C&C channel to fixed IP detectionJuly 2023September 2024Allow1411YesNo
18198388Intelligent Hybrid Cloud Orchestration Engine leveraging 3 Layered Secured Data GatewayMay 2023June 2025Allow2510YesNo
18318230METHOD AND SYSTEM FOR ESTABLISHING TRUST FOR A CYBERSECURITY POSTURE OF A V2X ENTITYMay 2023August 2024Allow1510YesNo
18192469DATA PROCESSING PERMITS SYSTEM WITH KEYSMarch 2023November 2024Allow2020YesNo
18122958SYSTEM AND METHOD FOR SECURE AND PERFORMANT ECU PAIRINGMarch 2023June 2025Allow2710NoNo
18177434DETECTING PHISHING ATTACKSMarch 2023January 2025Allow2310YesNo
18109362SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATIONFebruary 2023August 2024Allow1820YesNo
18109312SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATIONFebruary 2023July 2024Allow1720YesNo
18109366SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATIONFebruary 2023April 2024Allow1410YesNo
18109314SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATIONFebruary 2023April 2024Allow1410YesNo
18109356SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATIONFebruary 2023July 2024Allow1720YesNo
18109048SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATIONFebruary 2023April 2024Allow1410YesNo
18109014SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATIONFebruary 2023June 2024Allow1620YesNo
18109001SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATIONFebruary 2023March 2024Allow1310YesNo
18108721SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATIONFebruary 2023September 2024Allow1920YesNo
18107237CAN BUS PROTECTION SYSTEMS AND METHODSFebruary 2023February 2024Allow1310YesNo
18099202METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR IMPROVING INTER-PUBLIC LAND MOBILE NETWORK (PLMN) ROUTING ACROSS SECURITY EDGE PROTECTION PROXIES (SEPPs) BY IMPLEMENTING HEALTH CHECKS FOR REMOTE SEPPsJanuary 2023May 2025Allow2810YesNo
18013074Cryptographic Computation Techniques for Multi-Party Reach and FrequencyDecember 2022April 2025Allow2710YesNo
18009201METHOD, SYSTEM AND APPARATUS FOR UNIFIED PLUG-IN MICRO-SERVICE ACCESS CONTROLDecember 2022March 2025Allow2710YesNo
18056977Extended Security Scheme for Reducing the Prevalence of Broken Object Level AuthorizationNovember 2022March 2025Allow2810YesNo
18056909VERIFICATION AND/OR VALIDATION OF UNREVERSIBLE INFORMATION HANDLING SYSTEM COMMANDSNovember 2022April 2025Allow2910YesNo
18055291SANITIZING PERSONALLY IDENTIFIABLE INFORMATION (PII) IN AUDIO AND VISUAL DATANovember 2022April 2025Allow2920YesNo
18049654Stacked Malware Detector For Mobile PlatformsOctober 2022April 2025Allow3010YesNo
17920978SYSTEM AND METHOD FOR PATTERN-BASED DETECTION AND MITIGATION OF ZERO-DAY VULNERABILITY EXPLOITATIONOctober 2022February 2025Allow2810YesNo
17960546Hybrid Approach To Data GovernanceOctober 2022May 2024Allow1920YesNo
17951690THREAT MITIGATION SYSTEM AND METHODSeptember 2022November 2023Allow1310YesNo
17909295CLUSTER ACCESS METHOD, ELECTRONIC DEVICE AND MEDIUMSeptember 2022March 2025Abandon3110NoNo
17901164SYSTEM AND METHOD FOR DECRYPTING ENCRYPTED SECRET DATA ITEMS WITHOUT MASTER PASSWORDSeptember 2022February 2025Allow2910YesNo
17901575VAULTLESS TOKENIZATIONSeptember 2022December 2024Allow2710NoNo
17896553Method and Apparatus for Security Management based on I2NSF Analytics Interface YANG Data ModelAugust 2022March 2025Allow3920YesNo
17890826SYSTEM AND RELATED METHODS FOR EFFICIENTLY PROVIDING RESOURCES AND TECHNOLOGY TO REMOTELY WORKING EMPLOYEESAugust 2022February 2025Allow3010YesNo
17818970METHODS AND SYSTEMS FOR DETECTING MALICIOUS MESSAGESAugust 2022June 2025Allow3420YesNo
17878592IOT Blockchain DDOS Detection and CountermeasuresAugust 2022June 2025Allow3521NoNo
17814908MONITORING FOR LATERAL MOVEMENTS-RELATED SECURITY THREATSJuly 2022July 2023Allow1210YesNo
17791248DATA PRIVACY PROTECTION BASED POLAR CODINGJuly 2022December 2024Allow2910YesNo
17858322SYSTEMS AND METHODS FOR DYNAMIC TRAFFIC CONTROL AT A FIREWALLJuly 2022February 2025Allow3120NoNo
17745417SECURITY PROFILE SELECTION AND CONFIGURATION OF NETWORK DEVICES VIA OWNERSHIP VOUCHER EXTENSIONMay 2022September 2024Allow2810YesNo
17737316RULE SELECTION MANAGEMENT BASED ON CURRENTLY AVAILABLE DOMAIN NAME SYSTEM (DNS) SERVERSMay 2022August 2024Allow2710YesNo
17723957DATA TREATMENT APPARATUS AND METHODSApril 2022May 2025Allow3710YesNo
17767138EVALUATION APPARATUS, EVALUATION METHOD, AND PROGRAMApril 2022November 2024Allow3210YesNo
17695177SYSTEM AND METHOD FOR SECURE TRANSFER OF COMPLETELY ENCRYPTED DATA AT WIRE SPEEDSMarch 2022February 2025Allow3520YesNo
17685880AUTHENTICATION AS A SERVICEMarch 2022May 2023Allow1510YesNo
17684143MANAGING TRAFFIC RULES IN ASSOCIATION WITH FULLY QUALIFIED DOMAIN NAMES (FQDNS) USING POSTURE INFORMATION ASSOCIATED WITH DNS RECORDSMarch 2022October 2024Allow3220YesNo
17638728SECURED HD MAP SERVICES USING BLOCKCHAINFebruary 2022May 2025Abandon3820YesNo
17650333ZERO TRUST BASED ACCESS MANAGEMENT OF INFRASTRUCTURE WITHIN ENTERPRISE USING MICRO-SEGMENTATION AND DECENTRALIZED IDENTIFIER NETWORKFebruary 2022September 2024Allow3110NoNo
17579383SANITIZING PERSONALLY IDENTIFIABLE INFORMATION (PII) IN AUDIO AND VISUAL DATAJanuary 2022November 2024Allow3420YesNo
17625282CUSTODIAL INTEGRITY FOR VIRTUAL DIGITAL ASSETS AND RELATED TECHNOLOGIESJanuary 2022October 2024Abandon3410NoNo
17546944SYSTEM AND METHOD FOR NETWORK SECURITYDecember 2021October 2024Abandon3410NoNo
17545831AUTOMATIC VERIFICATION OF DECENTRAILIZED PROTOCOLSDecember 2021June 2024Allow3010YesNo
17545594SYSTEMS AND METHODS OF NETWORK SECURITY ANOMALY DETECTIONDecember 2021July 2024Allow3110YesNo
17545303METHOD AND APPARATUS FOR COUNTERING DDOS ATTACKS IN NDN NETWORKDecember 2021February 2025Abandon3820NoNo
17541998CUSTOM RULES FOR GLOBAL CERTIFICATE ISSUANCEDecember 2021May 2024Allow2910YesNo
17613406KNOWLEDGE PROOFNovember 2021September 2024Allow3420NoNo
17500308DEOBFUSCATING AND DECLOAKING WEB-BASED MALWARE WITH ABSTRACT EXECUTIONOctober 2021January 2024Allow2710YesNo
17602112SYSTEMS AND METHODS FOR HANDLING TELESCOPIC FQDNSOctober 2021February 2024Allow2910YesNo
17492591DATA TOKENIZATION AND SEARCH IN A DISTRIBUTED NETWORKOctober 2021June 2024Allow3320NoNo
17489117DETECTING VISUAL SIMILARITY BETWEEN DNS FULLY QUALIFIED DOMAIN NAMESSeptember 2021March 2024Allow2910YesNo
17489168CONTAINER-BASED ASSOCIATION AND SHARING OF DOMAIN NAME SYSTEM CONFIGURATION OBJECTSSeptember 2021May 2024Allow3220YesNo
17482894Rule-Based Network-Threat Detection For Encrypted CommunicationsSeptember 2021July 2023Allow2230YesNo
17482921Rule-Based Network Threat Detection for Encrypted CommunicationsSeptember 2021June 2023Allow2030YesNo
17482910Rule-Based Network-Threat Detection for Encrypted CommunicationsSeptember 2021August 2022Allow1120YesNo
17471414Rule Detection Method and Related DeviceSeptember 2021October 2023Allow2520YesNo
17461551SYSTEMS AND METHODS FOR USE OF ADDRESS FIELDS IN A SIMULATED PHISHING ATTACKAugust 2021March 2023Allow1830YesNo
17443316TREE-BASED LEARNING OF APPLICATION PROGRAMMING INTERFACE SPECIFICATIONJuly 2021January 2024Allow3010YesNo
17383784Rule-Based Network-Threat Detection For Encrypted CommunicationsJuly 2021June 2023Allow2330YesNo
17383702Rule-Based Network-Threat Detection For Encrypted CommunicationsJuly 2021May 2023Allow2230YesNo
17424987SYSTEM FOR FACE AUTHENTICATION AND METHOD FOR FACE AUTHENTICATIONJuly 2021July 2024Allow3620YesNo
17375869GENERATING NETWORK INFASTRUCTURE FIREWALLSJuly 2021July 2023Allow2410YesNo
17355371Detecting Separate Login During Action Based Knowledge-Based Authentication and Disqualifying ValidityJune 2021January 2024Allow3110YesNo
17354103GENERATIVE CRYPTOGRAM FOR BLOCKCHAIN DATA MANAGMENTJune 2021January 2024Allow3110NoNo
17350890Protocol Switching For Connections To Zero-Trust ProxyJune 2021May 2023Allow2210YesNo
17341976DETECTING POTENTIAL MALICIOUS USE OF A RESOURCE MANAGEMENT AGENT USING A RESOURCE MANAGEMENT LOGJune 2021January 2024Allow3110YesNo
17339780DATA PROCESSING PERMITS SYSTEM WITH KEYSJune 2021August 2023Allow2720YesNo
17339782DATA PROCESSING PERMITS SYSTEM WITH KEYSJune 2021April 2023Allow2210YesNo
17333433CONFIGURING A SYSTEM FOR SELECTIVELY OBFUSCATING DATA TRANSMITTED BETWEEN SERVERS AND END-USER DEVICESMay 2021October 2023Allow2910YesNo
17321423USE OF STATELESS MARKING TO SPEED UP STATEFUL FIREWALL RULE PROCESSINGMay 2021April 2023Allow2310YesNo
17307304DOCUMENT MANAGEMENT APPARATUS, DOCUMENT MANAGEMENT SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUMMay 2021July 2024Abandon3910NoNo
17243874SECURE REMOTE SUPPORT AUTHORIZATIONApril 2021August 2023Allow2820YesNo
17238774INTELLIGENT MONITORING AND LOGGING PLATFORMApril 2021February 2024Allow3420NoNo
17287768Technique for collecting information relating to a flow routed in a networkApril 2021January 2024Allow3320YesNo
17215809SYSTEM AND METHOD FOR DETECTION OF ABNORMAL DEVICE TRAFFIC BEHAVIORMarch 2021November 2024Allow4330YesNo
17276725CONFIDENTIAL METHOD FOR PROCESSING LOGS OF A COMPUTER SYSTEMMarch 2021August 2024Allow4120YesNo
17275921Message ProcessingMarch 2021July 2024Allow4030NoNo
17193757FACILITATION OF NETWORK PROTECTION FOR 5G OR OTHER NEXT GENERATION NETWORKMarch 2021October 2023Abandon3220YesNo
17191350Automatic Inline Detection based on Static DataMarch 2021February 2024Allow3510YesNo
17191467PROTECTING SENSITIVE DATA FROM BEING EXPOSED IN GRAPH EMBEDDING VECTORSMarch 2021December 2023Allow3410NoNo
17178669PRIVACY PRESERVATION IN NETWORK CONNECTIONSFebruary 2021May 2023Abandon2610NoNo
17175872DETECTING BOTNETSFebruary 2021July 2023Allow2920YesNo
17162906DETECTING FRAUD BY CORRELATING USER BEHAVIOR BIOMETRICS WITH OTHER DATA SOURCESJanuary 2021June 2023Allow2820YesNo
17160164AI/ML APPROACH FOR DDOS PREVENTION ON 5G CBRS NETWORKSJanuary 2021March 2024Allow3840YesNo
17125818SYSTEM AND METHOD FOR ANALYTICS BASED WAF SERVICE CONFIGURATIONDecember 2020January 2024Allow3730YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LEE, MICHAEL M.

Strategic Value of Filing an Appeal

Total Appeal Filings
9
Allowed After Appeal Filing
5
(55.6%)
Not Allowed After Appeal Filing
4
(44.4%)
Filing Benefit Percentile
85.5%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 55.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner LEE, MICHAEL M - Prosecution Strategy Guide

Executive Summary

Examiner LEE, MICHAEL M works in Art Unit 2436 and has examined 217 patent applications in our dataset. With an allowance rate of 83.9%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 33 months.

Allowance Patterns

Examiner LEE, MICHAEL M's allowance rate of 83.9% places them in the 53% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by LEE, MICHAEL M receive 2.43 office actions before reaching final disposition. This places the examiner in the 83% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by LEE, MICHAEL M is 33 months. This places the examiner in the 27% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +56.9% benefit to allowance rate for applications examined by LEE, MICHAEL M. This interview benefit is in the 96% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 33.0% of applications are subsequently allowed. This success rate is in the 64% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 18.5% of cases where such amendments are filed. This entry rate is in the 14% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 57.1% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 46% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 88% percentile among all examiners. Of these withdrawals, 66.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.

Petition Practice

When applicants file petitions regarding this examiner's actions, 31.6% are granted (fully or in part). This grant rate is in the 24% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 13% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 2.2% of allowed cases (in the 66% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Expect multiple rounds of prosecution: This examiner issues more office actions than average. Address potential issues proactively in your initial response and consider requesting an interview early in prosecution.
  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.
  • Appeal filing as negotiation tool: This examiner frequently reconsiders rejections during the appeal process. Filing a Notice of Appeal may prompt favorable reconsideration during the mandatory appeal conference.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.