USPTO Examiner HERZOG MADHURI R - Art Unit 2438

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18695628PROVENANCE GRAPH-ORIENTED HOST INTRUSION DETECTION METHOD AND SYSTEM, AND STORAGE MEDIUMMarch 2024September 2024Allow610YesNo
18584531INTENT-BASED ENTERPRISE SECURITY USING DYNAMIC LEARNING OF NETWORK SEGMENT PREFIXESFebruary 2024May 2025Allow1510NoNo
18397161FILTERING DATA LOGS FROM DISPARATE DATA SOURCESDecember 2023February 2025Allow1410NoNo
18347158SECURITY SYSTEM FOR MANAGING 5G NETWORK TRAFFIC BACKGROUNDJuly 2023October 2024Allow1610YesNo
18209714DERIVING AND AUGMENTING ACCESS CONTROL FOR DATA LAKESJune 2023October 2024Allow1620YesNo
18098737INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND METHOD OF PROCESSING INFORMATIONJanuary 2023April 2025Allow2630YesNo
18065679SERVER APPARATUS AND CONTROL METHOD THEREOF, INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF, INFORMATION PROCESSING SYSTEM, AND STORAGE MEDIUMDecember 2022April 2025Allow2810NoNo
18061522Method and System for Remote Data AccessDecember 2022September 2023Allow910NoNo
17977175SYSTEMS AND METHODS FOR AN ENTITY TO CONTROL INFORMATION EXCHANGEOctober 2022October 2023Allow1220YesNo
17976144SYSTEMS AND METHODS FOR USE IN IMPLEMENTING SELF-EXCLUSION PREFERENCESOctober 2022February 2025Allow2810YesNo
17918890NUMERICAL VALUE RANKING METHOD AND APPARATUS BASED ON BLOCKCHAINOctober 2022September 2023Allow1110YesNo
17949910Privacy Enhanced BSS and Discovery MechanismsSeptember 2022February 2025Allow2910NoNo
17949320System And Method Of Detecting File System Modifications Via Multi-layer File System StateSeptember 2022July 2023Allow1020YesNo
17879805SECURE TIME SOURCE FOR TRUSTED EXECUTION ENVIRONMENTSAugust 2022November 2024Abandon2720NoNo
17844571SYSTEM AND METHOD OF INTELLIGENT DETECTION OF DATA MODEL FIELDNAME LINEAGE WITH GEOGRAPHICAL LOCATION MOVEMENT CONTROLJune 2022April 2025Allow3440YesNo
17836587Method and System for Remote Data AccessJune 2022September 2022Allow310NoNo
17830853URL PATTERN-BASED RISK SCORING AND ANOMALY DETECTIONJune 2022November 2024Allow3010YesNo
17824323CONTROL ASSESSMENT SYSTEMS, METHODS AND PROGRAM PRODUCTSMay 2022October 2024Allow2910YesNo
17777843SECURE OPERATING MODES FOR COMPUTING DEVICESMay 2022December 2023Allow1920YesNo
17729563SYSTEMS AND METHODS FOR MANAGING PARTIAL PRIVATE KEYS FOR CRYPTOGRAPHY-BASED, STORAGE APPLICATIONS USED IN BLOCKCHAIN OPERATIONS FOR DECENTRALIZED APPLICATIONSApril 2022January 2025Allow3310YesNo
17722561SECURE AND ROBUST FEDERATED LEARNING SYSTEM AND METHOD BY MULTI-PARTY HOMOMORPHIC ENCRYPTIONApril 2022May 2025Allow3720YesNo
17722298SECURE DATA ACCESS FOR ELECTRONIC DEVICESApril 2022October 2024Allow3010YesNo
17712704DIRECTORY SERVICE USER SYNCHRONIZATIONApril 2022July 2023Allow1510YesNo
17697098SECURING DATA VIA ENCRYPTED GEO-LOCATED PROVENANCE METADATAMarch 2022February 2024Allow2310NoNo
17687445UNMANNED AERIAL VEHICLE AUTHENTICATION METHOD AND APPARATUSMarch 2022June 2023Allow1510NoNo
17573192PRIVACY ENFORCEMENT VIA LOCALIZED PERSONALIZATIONJanuary 2022February 2024Abandon2520NoNo
17622610DATA ENCRYPTION AND DECRYPTION METHOD, DEVICE, STORAGE MEDIUM AND ENCRYPTED FILEDecember 2021March 2025Allow3920YesNo
17645622SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY OPTIMIZATIONDecember 2021April 2023Allow1610NoNo
17546768METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR PROTECTING A DEEP REINFORCEMENT LEARNING AGENTDecember 2021March 2024Allow2711NoNo
17596020METHOD FOR TRANSMITTING INFORMATIONDecember 2021March 2024Allow2810YesNo
17596071IMAGE RECOGNITION SYSTEM, IMAGE RECOGNITION SERVER, AND IMAGE RECOGNITIONDecember 2021August 2024Allow3210YesNo
17526777SCALABLE AND SECURE EDGE CLUSTER REGISTRATIONNovember 2021August 2024Allow3320YesNo
17609140GATEWAY DEVICENovember 2021July 2024Allow3220YesNo
17516309METHOD FOR AUTHENTICATING USER AND ELECTRONIC DEVICE ASSISTING SAMENovember 2021February 2024Allow2710YesNo
17505435CELLULAR INTERNET OF THINGS BATTERY DRAIN PREVENTION IN MOBILE NETWORKSOctober 2021June 2023Allow2010YesNo
17500816SYSTEMS AND METHODS FOR USING IDENTIFIERS OF ENROLLMENT SYSTEMS FOR USER AUTHENTICATIONOctober 2021December 2024Allow3830YesNo
17450753MULTI-USER COLLABORATION TOOL FOR SPREADSHEET APPLICATIONSOctober 2021February 2024Abandon2810NoNo
17498273THREAT DETECTION PLATFORMS FOR DETECTING, CHARACTERIZING, AND REMEDIATING EMAIL-BASED THREATS IN REAL TIMEOctober 2021September 2022Allow1120YesNo
17601696DATA SHARINGOctober 2021July 2024Abandon3410NoNo
17484689Re-Training Intrusion Detection Fingerprints in the Presence of an AttackerSeptember 2021August 2024Allow3510YesNo
17483329FPGA CHIP WITH PROTECTED JTAG INTERFACESeptember 2021November 2023Allow2610NoNo
17474035OBFUSCATING INTELLIGENT DATA WHILE PRESERVING RESERVE VALUESSeptember 2021January 2024Allow2920YesNo
17470451PRIVACY, PERMISSION, AND USER SAFETY MANAGEMENT VIRTUAL ASSISTANT FOR A COMMUNICATION SESSIONSeptember 2021September 2024Allow3611NoNo
17464267COMPUTER SECURITY SYSTEM AND METHODSeptember 2021December 2023Abandon2810NoNo
17432956METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR CONTROLLING ACCESS IN A NETWORK OF SERVERSAugust 2021May 2024Allow3310YesNo
17392871BLOCKCHAIN-BASED DATA EVIDENCE STORAGE METHOD AND APPARATUSAugust 2021September 2022Allow1420YesNo
17377845PREEMPTIVE PROTECTION AGAINST MALICIOUS ARRAY ACCESSJuly 2021October 2023Allow2710NoNo
17364131CLASSIFYING DATA AND ENFORCING DATA ACCESS CONTROL USING A CONTEXT-BASED HIERARCHICAL POLICYJune 2021May 2025Allow4650NoNo
17417571THREAT FORECASTINGJune 2021May 2024Abandon3510NoNo
17347025USER CREDENTIALS VERIFICATION FOR SEARCHJune 2021July 2023Allow2520YesNo
17331355SYSTEMS AND METHODS FOR MITIGATING BORDER GATEWAY PROTOCOL ATTACKS IN REAL-TIMEMay 2021April 2024Allow3410NoNo
17243836Private application access with browser isolationApril 2021March 2024Allow3420YesNo
17241383ACCESS CONTROL FOR ON-DEVICE MACHINE LEARNING MODELSApril 2021October 2024Allow4130YesNo
17237872ANOMALY-BASED MITIGATION OF ACCESS REQUEST RISKApril 2021April 2025Allow4740YesNo
17286633INFORMATION PROCESSING SYSTEM, INPUT DEVICE, USER AUTHENTICATION METHOD, SERVER DEVICE, AND BIOMETRIC AUTHENTICATION DEVICEApril 2021January 2025Allow4430YesNo
17222830SECURE ASSET MANAGEMENT SYSTEMApril 2021April 2023Allow2410NoNo
17301278INTENT-BASED ENTERPRISE SECURITY USING DYNAMIC LEARNING OF NETWORK SEGMENT PREFIXESMarch 2021October 2023Allow3010NoNo
17217119ADAPTIVE METADATA ENCRYPTION FOR A DATA PROTECTION SOFTWAREMarch 2021November 2024Allow4350NoNo
17214252SYSTEMS AND METHODS TO CONTROL ACCESS TO COMPONENTS OF VIRTUAL OBJECTSMarch 2021March 2023Allow2410NoNo
17207278CONSENSUS VERIFICATION METHOD, APPARATUS, AND DEVICEMarch 2021September 2021Allow610NoNo
17187377Treating Data Flows Differently Based on Level of InterestFebruary 2021January 2024Allow3510YesNo
17180821Providing Single Sign-On (SSO) in disjoint networks with non-overlapping authentication protocolsFebruary 2021June 2024Allow3930NoNo
17178320METHOD AND SYSTEM FOR GENERATING A LIST OF INDICATORS OF COMPROMISEFebruary 2021October 2023Allow3210NoNo
17176945RISK-BASED ACCESS TO COMPUTING ENVIRONMENT SECRETSFebruary 2021June 2023Allow2812YesNo
17268436ENCRYPTION FOR BLOCKCHAIN CRYPTOCURRENCY TRANSACTIONS AND USES IN CONJUNCTION WITH CARBON CREDITSFebruary 2021May 2024Abandon3901NoNo
17173584VIRTUAL SERVICE AUTHORIZATIONFebruary 2021June 2025Allow5280YesNo
17170595BLINDING TECHNIQUES FOR POST-QUANTUM PUBLIC KEYSFebruary 2021November 2023Abandon3320YesNo
17160597METHOD AND SYSTEM FOR LIMITING DATA ACCESSIBILITY IN COMPOSED SYSTEMSJanuary 2021November 2022Allow2110NoNo
17148258DATA MANAGEMENT METHOD AND APPARATUS FOR BLOCKCHAIN SYSTEM, MEDIUM, AND ELECTRONIC DEVICEJanuary 2021January 2024Allow3610YesNo
17140542SYSTEM AND METHOD FOR QUANTUM-ENABLED CYBER SECURITY IN A WIRELESS MOBILE NETWORKJanuary 2021January 2024Allow3610NoNo
17133177AUTOMATING IOT DEVICE IDENTIFICATION USING STATISTICAL PAYLOAD FINGERPRINTSDecember 2020February 2024Allow3840YesNo
17122506Peer-to-peer geolocation systemDecember 2020December 2022Abandon2410NoNo
17119500DECENTRALIZED ENCRYPTION AND DECRYPTION OF BLOCKCHAIN DATADecember 2020February 2023Allow2620YesNo
17098706SYSTEM AND METHOD FOR DETECTING MALICIOUS FILES BY A USER COMPUTERNovember 2020July 2023Allow3230YesNo
17054741ENCRYPTION SYSTEM, ENCRYPTION APPARATUS, DECRYPTION APPARATUS, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAMNovember 2020June 2024Abandon4340NoNo
17091275METHOD AND ELECTRONIC DEVICE FOR DETERMINING SECURITY THREAT ON RADIO ACCESS NETWORKNovember 2020March 2023Allow2820NoNo
17090588APPLICATION PROGRAM INTEGRITY VERIFICATION METHOD AND NETWORK DEVICENovember 2020July 2024Abandon4440YesNo
17089514FILTERING DATA LOGS FROM DISPARATE DATA SOURCES FOR PROCESSING BY A SECURITY ENGINENovember 2020September 2023Allow3420YesNo
17087786Storage of Data Objects in a Storage NetworkNovember 2020June 2024Allow4450NoNo
17070058SECURITY INCIDENT AND EVENT MANAGEMENT USE CASE SELECTIONOctober 2020August 2022Allow2220YesNo
17039864QUORUM-BASED ACCESS CONTROL MANAGEMENTSeptember 2020October 2023Allow3740YesNo
17032624SYSTEM AND METHOD FOR INTRUSION DETECTION ON A PHYSICAL LEVEL USING AN INTERNAL ANALOG TO DIGITAL CONVERTERSeptember 2020August 2024Allow4620YesYes
16979838TRUST EXTENSION IN A SECURE COMMUNICATION FRAMEWORKSeptember 2020August 2023Allow3530YesYes
16996039SECURITY SYSTEM, STORAGE MEDIUM STORING COMPUTER PROGRAM, AND DATA DIAGNOSTIC METHODAugust 2020September 2022Allow2510YesNo
16996830Peer-to-peer geolocation systemAugust 2020March 2022Allow1910YesNo
16921803SECURITY SYSTEM FOR DIRECTING 5G NETWORK TRAFFICJuly 2020November 2022Allow2910YesNo
16921798DISTRIBUTED SECURITY SYSTEM FOR VULNERABILITY-RISK-THREAT (VRT) DETECTIONJuly 2020June 2023Allow3530YesNo
16921765SECURITY SYSTEM FOR MANAGING 5G NETWORK TRAFFICJuly 2020March 2023Allow3320YesNo
16956270INTERFACE FOR A HARDWARE SECURITY MODULEJune 2020April 2023Allow3430YesNo
16895350SYSTEM AND METHOD FOR AUTOMATIC SECURE DELIVERY OF MODELJune 2020August 2023Abandon3821NoNo
16867566SYSTEMS AND METHODS FOR OPERATING SECURE ELLIPTIC CURVE CRYPTOSYSTEMSMay 2020July 2021Allow1410YesNo
16854103BIOMETRIC VERIFICATION OF A BLOCKCHAIN DATABASE TRANSACTION CONTRIBUTORApril 2020May 2021Allow1310NoNo
16757672DATA-PROCESSING DEVICE, COMPLETE ENTITY, AND METHOD FOR OPERATING A DATA-PROCESSING DEVICE OR COMPLETE ENTITYApril 2020July 2022Allow2710YesNo
16848503BLOCKCHAIN-BASED DATA EVIDENCE STORAGE METHOD AND APPARATUSApril 2020April 2021Allow1220YesNo
16835871AUTOMATIC INTRUSION DETECTION METHOD AND APPARATUSMarch 2020October 2023Allow4331NoNo
16643836CRYPTOGRAPHIC MEMORY OWNERSHIPMarch 2020March 2022Allow2410YesNo
16638938DATA PROTECTION SYSTEM, DATA PROTECTION METHOD, AND RECORDING MEDIUMFebruary 2020July 2022Allow2920NoNo
16786451INTRUDER DETECTION USING QUANTUM KEY DISTRIBUTIONFebruary 2020April 2022Allow2620YesNo
16631560METHODS PROVIDING NON-3GPP ACCESS USING ACCESS NETWORK KEYS AND RELATED WIRELESS TERMINALS AND NETWORK NODESJanuary 2020August 2023Allow4341NoNo
16735817MOBILE DEVICE APPLICATION SOFTWARE SECURITYJanuary 2020June 2023Abandon4140YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner HERZOG, MADHURI R.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
18
Examiner Affirmed
14
(77.8%)
Examiner Reversed
4
(22.2%)
Reversal Percentile
34.3%
Lower than average

What This Means

With a 22.2% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
36
Allowed After Appeal Filing
11
(30.6%)
Not Allowed After Appeal Filing
25
(69.4%)
Filing Benefit Percentile
43.9%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 30.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner HERZOG, MADHURI R - Prosecution Strategy Guide

Executive Summary

Examiner HERZOG, MADHURI R works in Art Unit 2438 and has examined 640 patent applications in our dataset. With an allowance rate of 79.5%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 31 months.

Allowance Patterns

Examiner HERZOG, MADHURI R's allowance rate of 79.5% places them in the 41% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.

Office Action Patterns

On average, applications examined by HERZOG, MADHURI R receive 2.21 office actions before reaching final disposition. This places the examiner in the 75% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by HERZOG, MADHURI R is 31 months. This places the examiner in the 36% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +11.3% benefit to allowance rate for applications examined by HERZOG, MADHURI R. This interview benefit is in the 49% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 30.6% of applications are subsequently allowed. This success rate is in the 53% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 28.3% of cases where such amendments are filed. This entry rate is in the 32% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 36.4% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 33% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 58.1% of appeals filed. This is in the 27% percentile among all examiners. Of these withdrawals, 40.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 41.1% are granted (fully or in part). This grant rate is in the 42% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 3.4% of allowed cases (in the 84% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 16% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Expect multiple rounds of prosecution: This examiner issues more office actions than average. Address potential issues proactively in your initial response and consider requesting an interview early in prosecution.
  • Examiner cooperation: This examiner frequently makes examiner's amendments to place applications in condition for allowance. If you are close to allowance, the examiner may help finalize the claims.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.