USPTO Examiner TAFAGHODI ZOHA PIYADEHGHIBI - Art Unit 2437

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
17081810APPARATUS AND METHOD FOR PREVENTING SIDE CHANNEL ATTACK FOR NTRU LPRime ALGORITHMFebruary 2021October 2023Allow3620NoNo
17138851RECORD MANAGEMENT APPARATUSDecember 2020May 2024Abandon4040NoNo
17136586METHOD AND APPARATUS FOR REGISTERING DEVICE IN CLOUD SERVERDecember 2020December 2023Allow3630YesNo
17118837REMOTE MANAGEMENT OF HARDWARE SECURITY MODULESDecember 2020September 2024Allow4540YesNo
17114318SECURING DATA IN MULTITENANT ENVIRONMENTDecember 2020March 2023Allow2720YesNo
17109795HOMOMORPHIC ENCRYPTION OFFLOAD FOR LIGHTWEIGHT DEVICESDecember 2020October 2022Allow2310NoNo
17107090SYSTEM AND METHOD OF SYNCHRONIZING A DISTRIBUTED CLOCK IN A PACKET-COMPATIBLE NETWORKNovember 2020April 2024Allow4130YesNo
17104578MACHINE LEARNING FOR DOCUMENT AUTHENTICATIONNovember 2020December 2023Abandon3730YesNo
16952918APPLICATION PROGRAMMING INTERFACES FOR NOTEBOOK SETTINGSNovember 2020June 2022Allow1900NoNo
17089895OFFLINE MULTI-FACTOR ONE-TIME PASSWORD AUTHENTICATIONNovember 2020October 2024Abandon4830YesNo
17083515VALIDATION OF TRANSACTION LEDGER CONTENT USING JAVA SCRIPT OBJECT NOTATION SCHEMA DEFINITIONOctober 2020June 2024Abandon4440NoNo
17048630SECURE CONNECTIONOctober 2020September 2023Abandon3540NoNo
17029410DATA PROCESSING METHOD, CIRCUIT, TERMINAL DEVICE AND STORAGE MEDIUMSeptember 2020September 2023Abandon3520YesNo
16981046HEARING SYSTEM, THREAT RESPONSE SYSTEM, METHOD, AND PROGRAMSeptember 2020September 2024Abandon4820NoNo
16980841INTERNET OF THINGS DEVICES FOR USE WITH AN ENCRYPTION SERVICESeptember 2020January 2023Abandon2820NoNo
16985550PASSTHROUGH MOBILE APPLICATION POLICYAugust 2020February 2023Allow3010NoNo
16938349System for Interexchange of State Data Among Disparate Block ChainsJuly 2020February 2022Allow1900NoNo
16930563DATA DECRYPTION METHOD AND APPARATUS, AND ELECTRONIC DEVICEJuly 2020January 2023Abandon3020NoNo
16930758VEHICULAR FIREWALL PROVISION DEVICEJuly 2020June 2022Abandon2310NoNo
16961552DATA MANAGEMENT DEVICE, DATA MANAGEMENT METHOD, AND COMPUTER READABLE MEDIUMJuly 2020August 2023Abandon3720YesNo
16924919METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROTECTING CONFIDENTIAL INTEGRATED CIRCUIT DESIGNJuly 2020April 2023Allow3330NoNo
16918144METHOD FOR EXECUTING A BINARY CODE OF A SECURE FUNCTION WITH A MICROPROCESSORJuly 2020September 2021Allow1500NoNo
16912482MOVING TARGET AUTHENTICATION PROTOCOLSJune 2020May 2022Allow2220YesNo
16910530METHOD AND SYSTEM FOR SSIS PASSWORD MANAGEMENT INTEGRATIONJune 2020July 2022Allow2410YesNo
16910010SYSTEMS FOR GENERATING AND MANAGING CERTIFICATE AUTHORITIESJune 2020August 2022Allow2510YesNo
16772543SECRET COMPUTATION SYSTEM AND METHODJune 2020September 2022Allow2720YesNo
16899536SECURE OPTICAL COMMUNICATION LINKJune 2020April 2023Allow3420YesNo
16897695DEFINING AND USING SERVICE RULES THAT REFERENCE ENDPOINT GROUP IDENTIFIERSJune 2020January 2023Allow3120NoNo
16890046DATA COMPARISON DEVICE, DATA COMPARISON SYSTEM, AND DATA COMPARISON METHODJune 2020December 2023Allow4330NoNo
16890584METHOD FOR PROVISION OF IDENTITY VERIFICATION CERTIFICATEJune 2020August 2022Allow2620YesNo
16888885SYSTEMS AND METHODS FOR PROTECTING NEURAL NETWORK WEIGHTSJune 2020July 2022Allow2500YesNo
16766253SERVING-NETWORK BASED PERFECT FORWARD SECURITY FOR AUTHENTICATIONMay 2020June 2023Allow3740YesNo
16872924Method and System for Providing a Brain Computer InterfaceMay 2020September 2021Allow1610NoNo
16870982De-identified Identity Proofing Methods and SystemsMay 2020March 2024Abandon4741NoNo
16758408COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND RECORDING MEDIUMApril 2020March 2022Allow2310NoNo
16852280BUILDING RESILIENT MODELS TO ADDRESS DYNAMIC CUSTOMER DATA USE RIGHTSApril 2020March 2023Allow3440NoNo
16831356SCALABLE TWEAK ENGINES AND PREFETCHED TWEAK VALUES FOR ENCYRPTION ENGINESMarch 2020October 2024Allow5460YesYes
16825068Applying Attestation to the Border Gateway Protocol (BGP)March 2020August 2023Allow4150YesNo
16823441METHOD FOR EXECUTING, WITH A MICROPROCESSOR, A BINARY CODE CONTAINING A CALLING FUNCTION AND A CALLED FUNCTIONMarch 2020June 2023Abandon3920YesNo
16824093METHOD AND SYSTEM FOR SECURE BLOCKCHAIN-BASED VEHICULAR DIGITAL FORENSICSMarch 2020October 2021Allow1900NoNo
16820122METHOD FOR ENCRYPTION AND DECRYPTION, PROGRAMMABLE SWITCH AND COMPUTER PROGRAM PRODUCTMarch 2020February 2023Allow3540YesYes
16815436Configuring Networked Devices Sharing a Common Firmware KeyMarch 2020July 2023Allow4040YesNo
16810962SELF-CONTAINED ENCRYPTED DATA AND DECRYPTION APPLICATION FOR THIRD PARTY DATA STORAGE AND DATA DISSEMINATIONMarch 2020January 2024Allow4640YesNo
16805920PROVIDING CASCADING QUANTUM ENCRYPTION SERVICES IN QUANTUM COMPUTING SYSTEMSMarch 2020July 2023Allow4030YesNo
16800807SYSTEMS AND METHODS FOR PREVENTING DENIAL OF SERVICE ATTACKS UTILIZING A PROXY SERVERFebruary 2020September 2021Allow1910NoNo
16773726SYSTEM FOR INFORMATION SECURITY THREAT ASSESSMENT BASED ON DATA HISTORYJanuary 2020May 2021Allow1600NoNo
16751792HOMOMORPHIC COMPUTATIONS ON ENCRYPTED DATA WITHIN A DISTRIBUTED COMPUTING ENVIRONMENTJanuary 2020June 2022Allow2820YesNo
16743868DATA STORAGE METHOD, DEVICE, RELATED EQUIPMENT AND CLOUD SYSTEM FOR HYBRID CLOUDJanuary 2020September 2022Allow3230YesNo
16742801DATA ANALYSIS SYSTEM AND DATA ANALYSIS METHODJanuary 2020April 2022Allow2720NoNo
16738106ACTIVATING OR DEACTIVATING A FEATURE OF A VEHICLEJanuary 2020September 2022Abandon3220YesNo
16718960SECURITY SETTLEMENT USING GROUP SIGNATURESDecember 2019June 2022Allow3020YesNo
16718460INTEGRITY PROTECTED COMMAND BUFFER EXECUTIONDecember 2019July 2022Allow3130NoNo
16719682SECURITY SETTLEMENT USING GROUP SIGNATURESDecember 2019July 2022Allow3120YesNo
16716155DYNAMIC ENCRYPTED ON-DEVICE STORAGE FOR SESSION QUALITY-AGNOSTIC MOBILE BUG EVIDENCE PRESERVATIONDecember 2019March 2024Allow5140YesNo
16614548WIRELESS AUTHENTICATION SYSTEMSNovember 2019June 2023Allow4330NoNo
16667468SYSTEMS AND METHODS FOR USE IN MANAGING ACCESS TO USER PROFILES, AND CONTENT BLOCKS INCLUDED THEREINOctober 2019September 2021Allow2210NoNo
16659008USER IDENTITY AUTHENTICATION USING VIRTUAL REALITYOctober 2019September 2021Allow2210YesNo
16591774METHODS AND SYSTEMS FOR SECURING VPN CLOUD SERVERSOctober 2019September 2021Allow2420NoNo
16582035FRAUD PREVENTION METHOD FOR INFORMATION PROCESSING DEVICESeptember 2019December 2021Abandon2610NoNo
16569284Automated Certificate Management for Automation InstallationsSeptember 2019January 2022Abandon2810NoNo
16564527ENCRYPTION FOR MACHINE LEARNING MODEL INPUTSSeptember 2019August 2022Abandon3510YesNo
16507395LAYOUT-INDEPENDENT CRYPTOGRAPHIC STAMP OF A DISTRIBUTED DATASETJuly 2019March 2021Allow2100YesNo
16459373DATA STREAM IDENTITYJuly 2019December 2020Allow1820YesNo
16442722Secure Memory ReadJune 2019February 2025Abandon6050YesYes
16426851PARTIAL-CONTEXT POLICY ENFORCEMENTMay 2019February 2021Allow2100NoNo
16282491MEMORY SYSTEM AND METHOD OF CONTROLLING NONVOLATILE MEMORYFebruary 2019January 2023Allow4720YesNo
16271258ENHANCED SECURITY FOR MULTIPLE NODE COMPUTING PLATFORMFebruary 2019August 2023Abandon5420YesNo
16270521Method and System of Implementing Security Algorithm and Decryption Algorithm by Using Reconfigurable ProcessorFebruary 2019September 2020Allow2020NoNo
16220412SELF-PROVISIONING AND PROTECTION OF A SECRET KEYDecember 2018December 2021Abandon3620NoNo
16212444UPDATING SECURITY CONTROLS OR POLICIES BASED ON ANALYSIS OF COLLECTED OR CREATED METADATADecember 2018July 2021Allow3120YesNo
16088338SECURE COMMUNICATION METHOD AND APPARATUS FOR VEHICLE, MULTIMEDIA SYSTEM FOR VEHICLE, AND VEHICLESeptember 2018March 2021Allow3010NoNo
16082259COMPUTER SYSTEMSeptember 2018September 2020Allow2420NoNo
16025416UNIFIED AUTHENTICATION SOFTWARE DEVELOPMENT KITJuly 2018October 2020Allow2820YesNo
16067574Systems and Method for Retroactive Assignment of Personally Identifiable Information in Distribution of Digital ContentJune 2018February 2021Abandon3210NoNo
16014418SECURITY MANAGEMENT FOR SERVICE AUTHORIZATION IN COMMUNICATION SYSTEMS WITH SERVICE-BASED ARCHITECTUREJune 2018November 2020Allow2910YesNo
16061264ENCRYPTION DEVICE, ENCRYPTION METHOD, COMPUTER READABLE MEDIUM, AND STORAGE DEVICEJune 2018February 2021Allow3210NoNo
15993366Machine Learning for Document AuthenticationMay 2018September 2020Allow2710YesNo
15990987SECURE SYSTEM ON CHIP FOR PROTECTING SOFTWARE PROGRAM FROM TAMPERING, REHOSTING AND PIRACY AND METHOD FOR OPERATING THE SAMEMay 2018May 2021Abandon3620NoNo
15991037SECURE RE-ENROLLMENT OF BIOMETRIC TEMPLATES USING FUNCTIONAL ENCRYPTIONMay 2018August 2020Allow2710YesNo
15987894SYSTEM AND METHOD FOR ENCRYPTING AND COMPRESSING BLOCKS OF DATAMay 2018January 2021Allow3210NoNo
15987631MAINTAINING SESSION STICKINESS ACROSS AUTHENTICATION AND AUTHORIZATION CHANNELS FOR ACCESS MANAGEMENTMay 2018April 2021Allow3520YesNo
15986734LOCALLY PRIVATE DETERMINATION OF HEAVY HITTERSMay 2018January 2021Allow3210NoNo
15983594AUTOMOTIVE NONCE-MISUSE-RESISTANT AUTHENTICATED ENCRYPTIONMay 2018August 2020Allow2710YesNo
15982844PAIRING WITH COMPANION DEVICEMay 2018November 2020Allow3020YesNo
15948198METHOD AND SYSTEM FOR APPLYING COMPLIANCE POLICIES ON PRIVATE AND PUBLIC CLOUDApril 2018August 2020Allow2910NoNo
15948100KEYSTREAM GENERATION USING MEDIA DATAApril 2018July 2021Allow3930YesNo
15941593Distributed System for Adaptive Protection Against Web-Service-Targeted Vulnerability ScannersMarch 2018September 2020Allow2910NoNo
15938615SYSTEM AND METHOD THEREOF FOR CONTEXTUAL CUSTOMIZATION OF NOTIFICATIONSMarch 2018December 2020Abandon3210NoNo
15874698Join Operations on Encrypted Database TablesJanuary 2018May 2020Allow2710YesNo
15859950WATERMARKING ANONYMIZED DATASETS BY ADDING DECOYSJanuary 2018December 2020Allow3620NoNo
15859780SECURE CLIENT AUTHENTICATION BASED ON CONDITIONAL PROVISIONING OF CODE SIGNATUREJanuary 2018May 2020Allow2920YesNo
15835765PREVENTION OF MALICIOUS AUTOMATION ATTACKS ON A WEB SERVICEDecember 2017June 2022Allow5450NoNo
15830532IMAGE PROCESSING APPARATUS, METHOD OF NOTIFICATION OF THE NUMBER OF IC CARD PROCESSES FOR THE IMAGE PROCESSING APPARATUS, AND RECORDING MEDIUMDecember 2017May 2021Abandon4130YesNo
15827300METHOD AND APPARATUS FOR REGISTERING DEVICE IN CLOUD SERVERNovember 2017September 2020Allow3430YesNo
15827292SYSTEM FOR GENERATING A COMMUNICATION PATHWAY FOR THIRD PARTY VULNERABILITY MANAGEMENTNovember 2017October 2020Allow3420NoNo
15827094SYSTEM FOR INFORMATION SECURITY THREAT ASSESSMENT BASED ON DATA HISTORYNovember 2017December 2019Allow2510NoNo
15827171MULTICOMPUTER PROCESSING FOR DATA AUTHENTICATION AND EVENT EXECUTION USING A BLOCKCHAIN APPROACHNovember 2017June 2021Allow4330YesNo
15827211ENTITY RESOLUTION-BASED MALICIOUS FILE DETECTIONNovember 2017May 2020Allow2910YesNo
15827097SYSTEM FOR RECURRING INFORMATION SECURITY THREAT ASSESSMENTNovember 2017September 2020Allow3420YesNo
15825978IN-VEHICLE APPARATUS FOR EFFICIENT REPROGRAMMING AND CONTROLLING METHOD THEREOFNovember 2017September 2021Allow4640YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner TAFAGHODI, ZOHA PIYADEHGHIBI.

Strategic Value of Filing an Appeal

Total Appeal Filings
7
Allowed After Appeal Filing
3
(42.9%)
Not Allowed After Appeal Filing
4
(57.1%)
Filing Benefit Percentile
70.6%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 42.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner TAFAGHODI, ZOHA PIYADEHGHIBI - Prosecution Strategy Guide

Executive Summary

Examiner TAFAGHODI, ZOHA PIYADEHGHIBI works in Art Unit 2437 and has examined 155 patent applications in our dataset. With an allowance rate of 78.7%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 32 months.

Allowance Patterns

Examiner TAFAGHODI, ZOHA PIYADEHGHIBI's allowance rate of 78.7% places them in the 49% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.

Office Action Patterns

On average, applications examined by TAFAGHODI, ZOHA PIYADEHGHIBI receive 2.13 office actions before reaching final disposition. This places the examiner in the 53% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by TAFAGHODI, ZOHA PIYADEHGHIBI is 32 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +14.1% benefit to allowance rate for applications examined by TAFAGHODI, ZOHA PIYADEHGHIBI. This interview benefit is in the 51% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 33.2% of applications are subsequently allowed. This success rate is in the 72% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 12.3% of cases where such amendments are filed. This entry rate is in the 14% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 80.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 64% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 89% percentile among all examiners. Of these withdrawals, 75.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.

Petition Practice

When applicants file petitions regarding this examiner's actions, 0.0% are granted (fully or in part). This grant rate is in the 2% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 15% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 18% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.
  • Appeal filing as negotiation tool: This examiner frequently reconsiders rejections during the appeal process. Filing a Notice of Appeal may prompt favorable reconsideration during the mandatory appeal conference.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.