Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18743030 | GENERATING THREAT STATEMENTS FOR A THREAT MODEL USING ARTIFICIAL INTELLIGENCE | June 2024 | March 2026 | Allow | 21 | 1 | 0 | Yes | No |
| 18279207 | DEVICE FOR EXTRACTING TRACE OF ACT, METHOD FOR EXTRACTING TRACE OF ACT, AND PROGRAM FOR EXTRACTING TRACE OF ACT | August 2023 | February 2026 | Abandon | 30 | 1 | 0 | No | No |
| 18144816 | METHOD FOR ENCRYPTION KEY GENERATION AND AUTHENTICATION BASED ON GAIT CHARACTERISTICS | May 2023 | January 2026 | Abandon | 32 | 1 | 0 | No | No |
| 18144380 | PARTIAL POOL CREDENTIALLING AUTHENTICATION SYSTEM | May 2023 | July 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18034536 | ANALYSIS APPARATUS, ANALYSIS SYSTEM, ANALYSIS METHOD, AND ANALYSIS PROGRAM | April 2023 | November 2025 | Abandon | 31 | 1 | 0 | No | No |
| 18295877 | Data Protection By Delayed Ordered Write Destage Operations | April 2023 | June 2025 | Allow | 26 | 2 | 0 | Yes | No |
| 18040215 | Enhanced Security for Existing Public Key Infrastructure | February 2023 | April 2025 | Allow | 27 | 1 | 0 | No | No |
| 18151737 | COMPUTING SYSTEMS AND METHODS FOR PROTECTING APPLICATION PROGRAMMING INTERFACES WITH TWO-FACTOR AUTHENTICATION | January 2023 | January 2026 | Allow | 36 | 3 | 0 | Yes | No |
| 18089967 | DOMAIN OWNERSHIP VERIFICATION FOR A ZTNA SERVICE PLATFORM | December 2022 | April 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18056177 | GENERAL ACCESS STRUCTURE SECRET SHARING USING AUTHENTIC GARBLED CIRCUITS | November 2022 | July 2025 | Abandon | 32 | 1 | 0 | No | No |
| 17997655 | TESTS RESULTS WITH SECURE ELEMENTS AND CRYPTOGRAPHY | October 2022 | July 2025 | Abandon | 32 | 1 | 0 | No | No |
| 17997477 | IMAGE DISPLAY DEVICE AND SYSTEM, AND OPERATION METHOD FOR SAME | October 2022 | June 2025 | Allow | 32 | 2 | 0 | No | No |
| 17916599 | AUTHENTICATION SERVER, AUTHENTICATION SYSTEM, CONTROL METHOD OF AUTHENTICATIONSERVER, AND STORAGE MEDIUM | October 2022 | May 2025 | Abandon | 31 | 1 | 0 | No | No |
| 17909434 | FINGERPRINT CARD IMPLEMENTATION METHOD AND FINGERPRINT CARD | September 2022 | December 2025 | Abandon | 39 | 3 | 0 | No | No |
| 17908591 | GROUP MANAGEMENT APPARATUS, GROUP MANAGEMENT METHOD, AND COMPUTER READABLE MEDIUM | September 2022 | May 2025 | Abandon | 32 | 1 | 0 | Yes | No |
| 17884739 | HARDWARE-BASED MESSAGE BLOCK PADDING FOR HASH ALGORITHMS | August 2022 | January 2025 | Allow | 29 | 2 | 0 | Yes | No |
| 17872718 | User Authentication Using Behavior Patterns | July 2022 | February 2026 | Abandon | 43 | 4 | 0 | Yes | No |
| 17813231 | Accessing a virtual sub-environment in a virtual environment | July 2022 | November 2025 | Abandon | 40 | 4 | 0 | Yes | No |
| 17830225 | ENHANCEMENT OF TRUSTWORTHINESS OF ARTIFICIAL INTELLIGENCE SYSTEMS THROUGH DATA QUALITY ASSESSMENT | June 2022 | June 2024 | Allow | 25 | 1 | 0 | Yes | No |
| 17749477 | APPARATUS AND METHOD FOR DETECTING WEB SCANNING ATTACK | May 2022 | May 2025 | Abandon | 35 | 4 | 0 | No | No |
| 17737812 | PREDICTIVE BAD EVENT ALERT GENERATION | May 2022 | June 2025 | Abandon | 37 | 5 | 0 | Yes | Yes |
| 17734967 | WEARABLE DEVICE SYNCHRONIZATION SYSTEM AND METHODS | May 2022 | February 2025 | Allow | 34 | 3 | 0 | Yes | No |
| 17661468 | EAR-BASED BIOMETRIC IDENTIFICATION | April 2022 | May 2025 | Abandon | 36 | 2 | 0 | Yes | No |
| 17771838 | METHOD AND DATA PROCESSING SYSTEM FOR SAFEGUARDING DATA AGAINST UNAUTHORIZED ACCESS | April 2022 | May 2025 | Abandon | 37 | 2 | 0 | No | No |
| 17772008 | A SECURE HARDWARE PROGRAMMABLE ARCHITECTURE | April 2022 | January 2026 | Abandon | 45 | 4 | 0 | Yes | No |
| 17772103 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR REGISTERING A USER WITH A THIRD-PARTY SERVICE | April 2022 | January 2025 | Abandon | 33 | 1 | 0 | No | No |
| 17660469 | DETECTION/ASSESSMENT OF AN INTRUSION INTO AN ELECTRONIC DATA SYSTEM OF A VEHICLE | April 2022 | January 2026 | Abandon | 45 | 6 | 0 | No | No |
| 17725291 | USER ATTESTATION IN DISTRIBUTED CONTROL PLANE | April 2022 | October 2024 | Allow | 30 | 4 | 0 | Yes | No |
| 17714666 | TRANSFORMING DATAFLOWS INTO SECURE DATAFLOWS USING TRUSTED AND ISOLATED COMPUTING ENVIRONMENTS | April 2022 | May 2025 | Abandon | 37 | 2 | 0 | No | No |
| 17702692 | SYSTEM AND METHOD FOR NAVIGATION DASHBOARD | March 2022 | May 2025 | Abandon | 37 | 2 | 0 | Yes | No |
| 17692448 | PAIRING METHOD AND DEVICE | March 2022 | April 2025 | Abandon | 38 | 2 | 0 | Yes | No |
| 17635486 | REGISTRATION AND SECURITY ENHANCEMENTS FOR A WTRU WITH MULTIPLE USIMS | February 2022 | February 2025 | Allow | 36 | 3 | 0 | Yes | No |
| 17635528 | INFORMATION PROCESSING APPARATUS, NODE, DATA RECORDING METHOD, AND COMPUTER READABLE MEDIUM | February 2022 | April 2025 | Abandon | 38 | 2 | 0 | No | No |
| 17666380 | Auto-Configuration of Security Features in Distributed System with Minimal User Interaction | February 2022 | October 2025 | Abandon | 44 | 3 | 0 | Yes | No |
| 17589935 | SYSTEM, METHOD, AND PROCESS FOR IDENTIFYING AND PROTECTING AGAINST ADVANCED ATTACKS BASED ON CODE, BINARY AND CONTRIBUTORS BEHAVIOR | February 2022 | December 2024 | Abandon | 34 | 2 | 0 | No | No |
| 17582522 | METHOD AND SYSTEM FOR PROACTIVELY PROVIDING FIXES FOR VULNERABILITIES OF AN APPLICATION UPGRADE WHILE PERFORMING THE APPLICATION UPGRADE | January 2022 | July 2025 | Abandon | 42 | 4 | 0 | Yes | No |
| 17648734 | SYSTEMS AND METHODS FOR DETECTING RANSOMWARE ATTACKS ON FILE SHARING SYSTEMS | January 2022 | May 2024 | Allow | 28 | 1 | 0 | No | No |
| 17627252 | SYSTEMS AND METHODS FOR MANAGING BATTERIES | January 2022 | October 2024 | Allow | 33 | 3 | 0 | Yes | No |
| 17648095 | Shared Assistant Profiles Verified Via Speaker Identification | January 2022 | May 2025 | Allow | 40 | 4 | 0 | Yes | Yes |
| 17645925 | METHODS AND APPARATUS TO DETERMINE MUTEX ENTROPY FOR MALWARE CLASSIFICATION | December 2021 | April 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17619314 | EXECUTION CONTROL SYSTEM, EXECUTION CONTROL METHOD, AND PROGRAM | December 2021 | May 2025 | Abandon | 41 | 3 | 0 | No | No |
| 17548150 | IOT ADAPTIVE THREAT PREVENTION | December 2021 | June 2025 | Allow | 42 | 4 | 0 | Yes | No |
| 17616219 | RULE GENERATION APPARATUS, RULE GENERATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM | December 2021 | March 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17616003 | CONTROL SYSTEM | December 2021 | October 2025 | Abandon | 47 | 4 | 0 | Yes | No |
| 17513340 | CONFIGURING DETECTORS TO DETECT ANOMALOUS BEHAVIOR USING STATISTICAL MODELING PROCEDURES | October 2021 | September 2024 | Allow | 35 | 3 | 0 | Yes | No |
| 17512675 | FAULT INJECTION ATTACK SYSTEM | October 2021 | April 2024 | Allow | 29 | 2 | 0 | Yes | No |
| 17511643 | PROTECTION AGAINST EXECUTING INJECTED MALICIOUS CODE | October 2021 | May 2025 | Abandon | 43 | 4 | 0 | Yes | No |
| 17509159 | SYSTEMS AND METHODS FOR CONTROLLING AN INDUSTRIAL ASSET IN THE PRESENCE OF A CYBER ATTACK | October 2021 | January 2026 | Abandon | 50 | 6 | 0 | Yes | No |
| 17451680 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM | October 2021 | July 2025 | Abandon | 45 | 4 | 0 | Yes | No |
| 17451097 | SECURITY VULNERABILITY COMMUNICATION AND REMEDIATION WITH MACHINE LEARNING | October 2021 | February 2025 | Allow | 40 | 5 | 0 | Yes | No |
| 17494875 | RANSOMWARE DETECTION IN HOST ENCRYPTED DATA ENVIRONMENT | October 2021 | October 2024 | Abandon | 36 | 4 | 0 | Yes | No |
| 17483213 | Pattern-Based Identification of Sensitive Data in a Storage System | September 2021 | February 2026 | Abandon | 53 | 4 | 0 | Yes | No |
| 17482083 | TWO-LAYER SIDE-CHANNEL ATTACKS DETECTION METHOD AND DEVICES | September 2021 | August 2024 | Abandon | 34 | 2 | 0 | No | No |
| 17476622 | SECURE VOICE INTERFACE IN A STREAMING MEDIA DEVICE TO AVOID VULNERABILITY ATTACKS | September 2021 | October 2024 | Allow | 37 | 3 | 0 | Yes | No |
| 17439798 | CONTROLLER SYSTEM, SUPPORT DEVICE, AND EVALUATION METHOD | September 2021 | December 2024 | Abandon | 39 | 2 | 0 | No | No |
| 17461056 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT | August 2021 | February 2025 | Abandon | 42 | 4 | 0 | No | No |
| 17434097 | COMPUTER-IMPLEMENTED METHOD AND BLOCKCHAIN SYSTEM FOR DETECTING AN ATTACK ON A COMPUTER SYSTEM OR COMPUTER NETWORK | August 2021 | December 2024 | Abandon | 40 | 2 | 0 | Yes | No |
| 17415558 | SYSTEMS AND METHODS FOR MANAGING A TRUSTED APPLICATION IN A COMPUTER CHIP MODULE | June 2021 | May 2025 | Abandon | 47 | 4 | 0 | No | No |
| 17331402 | DETECTING ANOMALOUS EVENTS THROUGH APPLICATION OF ANOMALY DETECTION MODELS | May 2021 | January 2025 | Abandon | 44 | 4 | 0 | Yes | No |
| 17110833 | SECURE SYSTEM-ON-A-CHIP (SOC) BOOTUP | December 2020 | December 2025 | Abandon | 60 | 6 | 0 | No | Yes |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner BINCZAK, BRANDON MICHAEL.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 0.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner BINCZAK, BRANDON MICHAEL works in Art Unit 2437 and has examined 21 patent applications in our dataset. With an allowance rate of 33.3%, this examiner allows applications at a lower rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 41 months.
Examiner BINCZAK, BRANDON MICHAEL's allowance rate of 33.3% places them in the 5% percentile among all USPTO examiners. This examiner is less likely to allow applications than most examiners at the USPTO.
On average, applications examined by BINCZAK, BRANDON MICHAEL receive 3.43 office actions before reaching final disposition. This places the examiner in the 93% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by BINCZAK, BRANDON MICHAEL is 41 months. This places the examiner in the 21% percentile for prosecution speed. Applications take longer to reach final disposition with this examiner compared to most others.
Conducting an examiner interview provides a +46.7% benefit to allowance rate for applications examined by BINCZAK, BRANDON MICHAEL. This interview benefit is in the 91% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 14.7% of applications are subsequently allowed. This success rate is in the 11% percentile among all examiners. Strategic Insight: RCEs show lower effectiveness with this examiner compared to others. Consider whether a continuation application might be more strategic, especially if you need to add new matter or significantly broaden claims.
This examiner enters after-final amendments leading to allowance in 0.0% of cases where such amendments are filed. This entry rate is in the 1% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 8% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 18% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.