USPTO Examiner TRAORE FATOUMATA - Art Unit 2436

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19170903SOFTWARE COMPOSITION ANALYSIS (SCA) TO IDENTIFY AI-GENERATED CODE THAT IS COPIED CODE FROM THIRD-PARTY LIBRARIESApril 2025June 2025Allow200YesNo
19052090Detection of Vulnerabilities in Computational GraphsFebruary 2025December 2025Allow1020YesNo
19022847SYSTEMS AND METHODS FOR DYNAMICALLY DETERMINING ASSESSMENT RESULTSJanuary 2025November 2025Allow1020YesNo
18975340ARTIFICIAL INTELLIGENCE FOR CYBER THREAT INTELLIGENCEDecember 2024May 2025Allow610YesNo
18969536Cyber Detection Analytics EngineDecember 2024March 2025Allow300YesNo
18966866COMPUTER-BASED SYSTEMS CONFIGURED FOR MALWARE DETECTION AND METHODS OF USE THEREOFDecember 2024March 2025Allow410YesNo
18940914SYSTEM AND METHOD TO ANALYZE SECURITY ACROSS DIGITAL ENVIRONMENTSNovember 2024January 2025Allow200NoNo
18927703Cryptography Bill of Materials (CBOM) Generation from Binary ExecutablesOctober 2024January 2025Allow200NoNo
18887044SECURITY CONTROL SYSTEM AND METHODSeptember 2024August 2025Allow1020YesNo
18882699Host Deduplication for Vulnerability Detection and Management in IT SystemsSeptember 2024November 2024Allow300YesNo
18819112SUPPLEMENTAL ATTACK SURFACE SCANNER (SASS) CONFIGURATION INTEGRATION COMPONENTAugust 2024January 2026Allow1700NoNo
18811662Systems and Methods for Assessing Security in a Computing Device EnvironmentAugust 2024June 2025Abandon1010NoNo
18790022SYSTEM AND METHOD FOR AUTOMATED EXPLOITATION GENERATIONJuly 2024June 2025Allow1020NoNo
18791301Cryptography Bill of Materials (CBOM) Generation from Binary ExecutablesJuly 2024October 2024Allow300YesNo
18790060LARGE LANGUAGE MODEL-BASED VULNERABILITY REMEDIATION ACTION DESCRIPTIONSJuly 2024March 2026Allow1900YesNo
18767063Cybersecurity Vulnerability Management Program Evaluation SystemJuly 2024October 2025Allow1500YesNo
18756892SECURITY INTERCEPTOR FOR GENERATIVE ARTIFICIAL INTELLIGENCE PLATFORMSJune 2024October 2025Allow1500YesNo
18657330ACCURACY IN ATTACK TECHNIQUE LABELING IN AN EXTENDED DETECTION SYSTEMMay 2024September 2025Allow1600NoNo
18656895CLASSIFIER FOR IDENTIFYING SUSPICIOUS PDF FILES TO LIMIT DEEP-SCANNINGMay 2024March 2025Allow1120YesNo
18651045REQUIREMENT OPERATIONAL DEFINITIONS FOR INFORMATION SECURITY AND PRIVACY COMPLIANCEApril 2024October 2025Allow1700YesNo
18649484TECHNIQUES FOR IDENTIFYING GAPS IN SECURITY CONTROLSApril 2024October 2024Allow610NoNo
18649916ELECTRONIC SYSTEM FOR GENERATING AND TRACKING LINKED ELECTRONIC DIGITAL CERTIFICATESApril 2024July 2025Allow1410NoNo
18639082SYSTEMS AND METHODS FOR PROCESSING AND TRANSMITTING SENSOR DATAApril 2024November 2025Allow1900YesNo
18615543PROCESS TREE AND TAGSMarch 2024August 2025Allow1700NoNo
18615649VIRTUAL REALITY INFORMATION DELIVERY SYSTEMMarch 2024September 2025Allow1810YesNo
18693987BACKDOOR DETECTION DEVICE, BACKDOOR DETECTION METHOD, AND RECORDING MEDIUMMarch 2024March 2026Abandon2410NoNo
18693067CERTIFICATE MONITOR SERVICE RELIABILITY DETECTION METHOD FOR PKI CERTIFICATE TRANSPARENCY SYSTEMMarch 2024January 2026Allow2210NoNo
18603782Systems and Methods for Validation of a DeviceMarch 2024January 2026Allow2200YesNo
18593568Techniques for Inspecting Managed Workloads Deployed in a Cloud computing EnvironmentMarch 2024March 2026Allow2520YesNo
18435759SYSTEM AND METHOD FOR PRIVATE REGISTRY CYBERSECURITY INSPECTIONFebruary 2024March 2025Allow1320NoNo
18430366Host Deduplication for Vulnerability Detection and Management in IT SystemsFebruary 2024November 2024Allow1000YesNo
18429825NETWORK-BASED DEVICE AUTHENTICATION SYSTEMFebruary 2024November 2025Allow2100YesNo
18290589ABNORMALITY DETECTING DEVICE, SECURITY SYSTEM, AND ABNORMALITY NOTIFICATION METHODJanuary 2024March 2026Allow2620YesNo
18404630MEMORY SYSTEMS AND OPERATION METHODS THEREOF, HOST AND OPERATION METHODS THEREOF, AND ELECTRONIC APPARATUSESJanuary 2024June 2025Allow1800NoNo
18401547AUTONOMOUS NETWORK POLICY GENERATORDecember 2023June 2025Allow1700NoNo
18397544SYSTEM AND METHOD FOR PROVIDING THIRD PARTY COMPLIANCE TO COMPUTER AND SOFTWARE ENVIRONMENTSDecember 2023September 2024Allow800YesNo
18394708SYSTEMS AND METHODS FOR TRANSLATING DIFFERENT VULNERABILITY SCAN RESULTS INTO A STANDARDIZED FORMAT AND FOR CERTIFYING TARGET RESOURCES AGAINST DETECTION OF VULNERABILITIESDecember 2023July 2025Allow1900YesNo
18391440USE OF WORD EMBEDDINGS TO LOCATE SENSITIVE TEXT IN COMPUTER PROGRAMMING SCRIPTSDecember 2023December 2024Allow1210NoNo
18545955Systems And Methods For Assessing Security In A Computing Device EnvironmentDecember 2023August 2025Allow1920YesNo
18540980RISK SCORING SYSTEM FOR VULNERABILITY MITIGATIONDecember 2023April 2025Allow1620NoNo
18535873SYSTEMS AND METHODS FOR FACILITATING USE OF ARTIFICIAL INTELLIGENCE PLATFORMS TRAINED ON BLOCKCHAIN ACTION LINEAGES TO CONDUCT BLOCKCHAIN ACTIONSDecember 2023March 2024Allow300YesNo
18517713Systems and Methods for Validation of a DeviceNovember 2023February 2024Allow200NoNo
18513168DERIVED UNIQUE TOKEN PER TRANSACTIONNovember 2023June 2025Allow1900YesNo
18560807KILL CHAIN IDENTIFICATIONSNovember 2023September 2025Allow2201YesNo
18468166TECHNIQUES FOR INSPECTING MANAGED WORKLOADS DEPLOYED IN A CLOUD COMPUTING ENVIRONMENTSeptember 2023December 2023Allow300YesNo
18235413METHOD FOR ANONYMIZING MOVEMENT DATAAugust 2023October 2024Allow1410NoNo
18235411METHOD FOR ANONYMIZING MOVEMENT DATAAugust 2023November 2024Allow1520NoYes
18361507SYSTEMS AND METHODS FOR CONDUCTING BLOCKCHAIN ACTIONS BASED ON NETWORK MAPPINGS OF SELF-EXECUTING PROGRAM CHARACTERISTICSJuly 2023October 2023Allow300YesNo
18358917SYSTEMS AND METHODS FOR CONDUCTING BLOCKCHAIN ACTIONS BASED ON NETWORK MAPPINGS OF SELF-EXECUTING PROGRAM CHARACTERISTICSJuly 2023June 2024Allow1100YesNo
18217435Vulnerability Tracking Using Smatch Values of ScopesJune 2023May 2024Allow1010YesNo
18213983OPERATIONAL CHARACTERISTIC-BASED CONTAINER MANAGEMENTJune 2023March 2026Allow3220YesNo
18322887CYBERSECURITY INCIDENT RESPONSE AND SECURITY OPERATION SYSTEM EMPLOYING PLAYBOOK GENERATION THROUGH CUSTOM MACHINE LEARNINGMay 2023July 2024Allow1410YesNo
18318254ACCESS ORCHESTRATION ENGINE IN A CLOUD ACCESS MANAGEMENT SYSTEMMay 2023November 2025Allow3011YesNo
18310053NETWORK-BASED DEVICE AUTHENTICATION SYSTEMMay 2023December 2023Allow800YesNo
18139274PLATFORM AND METHOD FOR ASSESSMENT AND VERIFICATION OF SOFTWARE BILL OF MATERIALS (SBOM) AND VULNERABILITIES ACROSS A SOFTWARE SUPPLY CHAIN LIFE CYCLE USING BLOCKCHAINApril 2023August 2023Allow400YesNo
18132783SYSTEMS AND METHODS FOR AUTOMATED SYSTEM REQUIREMENT ANALYSISApril 2023January 2024Allow900YesNo
18130290SYSTEM AND APPARATUS FOR SECURE PASSWORD RECOVERY AND IDENTITY VERIFICATIONApril 2023March 2025Abandon2420NoNo
18245383METHOD FOR CONFIRMING OWNERSHIP OF DIGITAL ASSETS BASED ON HASH ALGORITHM AND METHOD FOR TRACING TO A SOURCE OF DIGITAL ASSETS BASED ON HASH ALGORITHMMarch 2023February 2025Allow2300YesNo
18112987METHODS FOR PROTECTING WEB BASED RESOURCES FROM D/DoS ATTACKS AND DEVICES THEREOFFebruary 2023May 2025Allow2640YesNo
18020512METHOD FOR ANONYMIZING MOVEMENT DATAFebruary 2023May 2023Allow300NoNo
18007362Computer-implemented method for testing the cybersecurity of a target environmentJanuary 2023April 2025Allow2700NoNo
18101295COMPUTER SYSTEM VULNERABILITY LOCKDOWN MODEJanuary 2023August 2023Allow700YesNo
18152694SYSTEMS AND METHODS FOR CONDUCTING BLOCKCHAIN ACTIONS BASED ON NETWORK MAPPINGS OF SELF-EXECUTING PROGRAM CHARACTERISTICSJanuary 2023June 2023Allow500YesNo
18094431MANAGING CRYPTOGRAPHIC COMPLIANCE ON A COMPUTING DEVICE USING A DISTRIBUTED LEDGERJanuary 2023February 2025Allow2600YesNo
18092220Systems and Methods for Assessing Security in a Computing EnvironmentDecember 2022March 2023Allow310YesNo
18012927PASSWORD HARDCODING CHECKING METHOD AND APPARATUS BASED ON PCA, AND MEDIUMDecember 2022April 2023Allow400YesNo
18061107HYBRID CLOUD-BASED SECURITY SERVICE METHOD AND APPARATUS FOR SECURITY OF CONFIDENTIAL DATADecember 2022May 2025Allow3010NoNo
18071977SYSTEM AND METHOD FOR EVALUATING PERFORMANCE OF A PATCHING PROCESS OF AN ENTERPRISE NETWORKNovember 2022September 2024Allow2200NoNo
17928484A METHOD FOR FINDING VULNERABILITIES IN A SOFTWARE PROJECTNovember 2022April 2025Allow2810YesNo
17985717METHOD AND SYSTEM FOR SOFTWARE SECURITY VULNERABILITY DIAGNOSTIC ASSESSMENTNovember 2022October 2024Allow2310NoNo
17963900APPARATUS AND METHOD FOR UPDATING CYBER SECURITY SUPPORT BASED ON REAL-TIME CHANGESOctober 2022June 2023Allow810YesNo
17959607SYSTEMS AND METHODS FOR PROVIDING A RESPONSE TO A DATABASE QUERYOctober 2022July 2025Allow3310YesNo
17937020DATA PLATFORM USER KEY-ROTATORSeptember 2022June 2025Abandon3310NoNo
17947840MEMORY DEDUPLICATION FOR ENCRYPTED VIRTUAL MACHINESSeptember 2022August 2025Allow3520YesNo
17941935Vulnerability Tracing Using Scope and OffsetSeptember 2022April 2023Allow700NoNo
17929370Method For Protection From Cyber Attacks To A Vehicle Based Upon Time Analysis, And Corresponding DeviceSeptember 2022October 2024Allow2610NoNo
17893891METHOD FOR EVOLVING ROOT OF TRUST AND ELECTRONIC DEVICE USING THE SAMEAugust 2022June 2024Allow2200NoNo
17890628PARALLEL SECRET SALT GENERATION AND AUTHENTICATION FOR ENCRYPTED COMMUNICATIONAugust 2022August 2024Allow2400YesNo
17798743APPARATUS AND METHOD FOR AUTOMATED POLICY MANAGEMENT FOR DEPLOYING APPLICATIONSAugust 2022September 2024Allow2510NoNo
17876420Cloud ProfileJuly 2022August 2024Allow2400NoNo
17874562SYSTEMS, METHODS, AND USER INTERFACES FOR INTELLIGENT AND EXPEDITED GENERATION OF CYBERSECURITY ARTIFACTS USING CYBERSECURITY CONTROL DATA OBJECTSJuly 2022June 2025Abandon3520NoNo
17875294SYSTEMS AND METHODS FOR MANAGING AND PROVIDING SOFTWARE PACKAGES WHICH HAVE UNDERGONE MALWARE AND/OR VULNERABILITY ANALYSISJuly 2022October 2022Allow300YesNo
17792147SECURE COMPUTATION APPARATUS, SECURE COMPUTATION METHOD, AND PROGRAMJuly 2022October 2024Allow2710YesNo
17859862METHOD FOR DETERMINING LIKELY MALICIOUS BEHAVIOR BASED ON ABNORMAL BEHAVIOR PATTERN COMPARISONJuly 2022January 2026Allow4230YesNo
17860001APPARATUS AND METHOD FOR PROCESSING DISTRIBUTED CONSENSUS USING MULTI-SIGNATUREJuly 2022August 2024Allow2610NoNo
17750378SYSTEMS, METHODS, AND USER INTERFACES FOR INTELLIGENT AND EXPEDITED GENERATION OF CYBERSECURITY ARTIFACTS USING CYBERSECURITY CONTROL DATA OBJECTSMay 2022July 2022Allow200YesNo
17742465SECURITY POSTURE RECOMMENDER SYSTEMMay 2022May 2025Allow3610NoNo
17733562SECURE ELEMENT ENFORCING A SECURITY POLICY FOR DEVICE PERIPHERALSApril 2022September 2024Allow2900YesNo
17658797REGULATION BASED PROTECTION OF DATA FOR STORAGE SYSTEMSApril 2022December 2024Allow3220YesNo
17717741Cybersecurity Vulnerability Management Program Evaluation SystemApril 2022April 2024Allow2400NoNo
17715472IMAGE ENCRYPTIONApril 2022May 2024Allow2500NoNo
17658149SYSTEMS AND METHODS FOR MALWARE DETECTIONApril 2022November 2023Allow2030YesNo
17706567Distribution and Management of Services in Virtual EnvironmentsMarch 2022September 2024Allow3010YesNo
17704877RETROACTIVELY ADDING ENCRYPTION AND/OR AUTHENTICATION LEVELS TO A BLOCKCHAINMarch 2022May 2024Allow2600YesNo
17655851PROVIDING ACCESS TO A PRIVATE RESOURCE IN AN ENTERPRISE SOCIAL NETWORKING SYSTEMMarch 2022April 2024Allow2520YesNo
17762491SECURITY RISK ANALYSIS ASSISTANCE DEVICE, METHOD, AND COMPUTER-READABLE MEDIUMMarch 2022February 2025Allow3520NoNo
17653762CYBERSECURITY INCIDENT RESPONSE AND SECURITY OPERATION SYSTEM EMPLOYING PLAYBOOK GENERATION THROUGH CUSTOM MACHINE LEARNINGMarch 2022March 2023Allow1300YesNo
17676116METHODS AND APPARATUS FOR PROVIDING BIOMETRIC AUTHENTICATION AND AUTHORIZATION SERVICESFebruary 2022July 2025Allow4120YesNo
17592714SYSTEMS AND METHODS FOR REDUCTION OF PRIVACY RISK IN DATAFebruary 2022December 2024Allow3420YesNo
17632734ONBOARD COMPUTER, COMPUTER PROGRAM, COMPUTER-READABLE RECORDING MEDIUM, AND SECURITY SETTING METHODFebruary 2022April 2025Allow3830YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner TRAORE, FATOUMATA.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
14
Examiner Affirmed
14
(100.0%)
Examiner Reversed
0
(0.0%)
Reversal Percentile
6.2%
Lower than average

What This Means

With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
66
Allowed After Appeal Filing
19
(28.8%)
Not Allowed After Appeal Filing
47
(71.2%)
Filing Benefit Percentile
43.1%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 28.8% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner TRAORE, FATOUMATA - Prosecution Strategy Guide

Executive Summary

Examiner TRAORE, FATOUMATA works in Art Unit 2436 and has examined 639 patent applications in our dataset. With an allowance rate of 81.1%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 32 months.

Allowance Patterns

Examiner TRAORE, FATOUMATA's allowance rate of 81.1% places them in the 52% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by TRAORE, FATOUMATA receive 2.12 office actions before reaching final disposition. This places the examiner in the 57% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by TRAORE, FATOUMATA is 32 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +39.4% benefit to allowance rate for applications examined by TRAORE, FATOUMATA. This interview benefit is in the 87% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 29.1% of applications are subsequently allowed. This success rate is in the 54% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 17.8% of cases where such amendments are filed. This entry rate is in the 21% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 81.2% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 64% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 77.4% of appeals filed. This is in the 69% percentile among all examiners. Of these withdrawals, 43.8% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.

Petition Practice

When applicants file petitions regarding this examiner's actions, 43.8% are granted (fully or in part). This grant rate is in the 36% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 5.3% of allowed cases (in the 86% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.8% of allowed cases (in the 59% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.
  • Examiner cooperation: This examiner frequently makes examiner's amendments to place applications in condition for allowance. If you are close to allowance, the examiner may help finalize the claims.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.