USPTO Examiner MOHAMMADI FAHIMEH M - Art Unit 2439

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
17138030UNIFORM RESOURCE LOCATOR VALIDATIONDecember 2020February 2024Allow3820YesNo
17136495TECHNIQUE FOR MODIFYING COMBINATION OF PLURALITY OF AUTHENTICATION APPARATUSES FORMING MUTAL AUTHENTICATION PAIRSDecember 2020June 2022Allow1800NoNo
17253059BLOCKCHAIN AND DNSSEC-BASED USER AUTHENTICATION METHOD, SYSTEM, DEVICE AND MEDIUMDecember 2020February 2023Abandon2620NoNo
17046780DIGITAL CERTIFICATE PROCESSING METHOD AND DEVICE, BLOCKCHAIN NODE AND STORAGE MEDIUMOctober 2020November 2023Allow3730YesNo
17034487APPLICATION SECURITY THROUGH DECEPTIVE AUTHENTICATIONSeptember 2020January 2024Allow3920YesNo
17031282DECENTRALIZED POLICY PUBLISH AND QUERY SYSTEM FOR MULTI-CLOUD COMPUTING ENVIRONMENTSeptember 2020February 2023Allow2910YesNo
16981121METHOD AND DEVICE FOR PERFORMING ONBOARDINGSeptember 2020May 2024Allow4420YesNo
17014085NETWORK DEVICE PROXIMITY-BASED AUTHENTICATIONSeptember 2020April 2022Allow1900YesNo
17001421SYSTEMS AND METHODS FOR PHONE NUMBER CERTIFICATION AND VERIFICATIONAugust 2020November 2023Abandon3821NoNo
16998852SYSTEM AND METHOD FOR SELECTING AUTHENTICATION METHODS FOR SECURE TRANSPORT LAYER COMMUNICATIONAugust 2020March 2023Allow3120YesNo
16990374METHOD AND SYSTEM FOR DOUBLE ANONYMIZATION OF DATAAugust 2020March 2022Allow2000YesNo
16934935DETECTING BEHAVIORAL ANOMALY IN MACHINE LEARNED RULE SETSJuly 2020March 2022Allow2000YesNo
16927387End User Device That Secures an Association of Application to Service Policy With an Application Certificate CheckJuly 2020May 2025Allow5870YesNo
16926567SYSTEMS AND METHODS FOR SECURING LOGIN ACCESSJuly 2020June 2023Allow3610YesNo
16926108CHAINING OF AUTHORIZATIONSJuly 2020July 2023Allow3620YesYes
16918022Injection of Tokens or Client Certificates for Managed Application CommunicationJuly 2020June 2022Allow2410YesNo
16915821METHOD FOR CLOUD ASSISTED AUTHORIZATION OF IOT IDENTITY BOOTSTRAPPINGJune 2020June 2022Allow2400YesNo
16911552SECURE GATEWAY ONBOARDING VIA MOBILE DEVICES FOR INTERNET OF THINGS DEVICE MANAGEMENTJune 2020September 2023Allow3930YesNo
16904650AGENTLESS IDENTITY-BASED NETWORK SWITCHINGJune 2020January 2022Allow1900YesNo
16879117CROSS-CHAIN INTERACTIONS USING A DOMAIN NAME SCHEME IN BLOCKCHAIN SYSTEMSMay 2020January 2021Allow820YesNo
15931909METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR BLOCKCHAIN-BASED RECORDKEEPINGMay 2020November 2020Allow600YesNo
16853017OFFLINE DATA STORAGE DEVICEApril 2020March 2023Allow3521YesNo
16848961SECURING IDENTITY TOKEN FORWARDINGApril 2020June 2022Allow2610YesNo
16849275STATELESS MUTUAL AUTHENTICATION BETWEEN SERVICESApril 2020September 2022Allow2910YesNo
16836733MAXIMUM DEVICE ACCESS RESTRICTION AT AUTHENTICATOR LEVELMarch 2020July 2023Allow4040YesNo
16836179AUTHENTICATION SERVER AND METHOD THAT ALLOW USER TO LOG INTO APPLICATION OR SERVICE PROVIDED VIA CLIENT DEVICESMarch 2020October 2022Allow3020YesNo
16805559AUTOMATIC NETWORK PROVISIONING OF A MEDICAL DEVICEFebruary 2020September 2022Allow3010YesNo
16795359PREVENTING ACCOUNT LOCKOUT THROUGH REQUEST THROTTLINGFebruary 2020June 2022Allow2810NoNo
16781028SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR CONTROLLING ACCESS TO ONLINE ACTIONSFebruary 2020December 2021Allow2200YesNo
16777455NETWORK SECURITY SYSTEM WITH COGNITIVE ENGINE FOR DYNAMIC AUTOMATIONJanuary 2020January 2021Allow1210YesNo
16747792AUTOMATED RENEWAL OF CERTIFICATES ACROSS A DISTRIBUTED COMPUTING SECURITY SYSTEMJanuary 2020March 2023Allow3830YesNo
16744079DATA STORAGE METHOD, DATA QUERY METHOD AND APPARATUSESJanuary 2020August 2020Allow700YesNo
16730352LEVERAGING LOCATION INFORMATION OF A SECONDARY DEVICEDecember 2019June 2023Abandon4120YesNo
16614931IMPROVEMENTS IN AND RELATING TO NETWORK COMMUNICATIONSNovember 2019August 2022Abandon3320NoNo
16666926AUTHENTICATION SYSTEM, AUTHENTICATION SERVER AND AUTHENTICATION METHODOctober 2019November 2021Allow2400YesNo
16664874METHOD AND APPARATUS FOR CONTROLLING ACCESS TO CUSTOM BROWSER FUNCTIONALITYOctober 2019February 2021Allow1510NoNo
16659074DIGITAL CERTIFICATES WITH DISTRIBUTED USAGE INFORMATIONOctober 2019August 2021Allow2220YesNo
16659076NETWORK SYSTEM AND METHOD FOR ACCESS MANAGEMENT AUTHENTICATION AND AUTHORIZATIONOctober 2019July 2021Allow2010YesNo
16606157METHOD FOR CARRYING OUT DATA TRANSFER PROCESSES IN INDUSTRIAL INSTALLATIONSOctober 2019July 2024Abandon5760YesNo
16600273ENCRYPTED DATA KEY MANAGEMENTOctober 2019March 2022Allow2910YesNo
16591280SYSTEM SECURITY INFRASTRUCTURE FACILITATING PROTECTING AGAINST FRAUDULENT USE OF INDIVIDUAL IDENTITY CREDENTIALSOctober 2019October 2021Allow2500YesNo
16588016FILEKEY ACCESS TO DATASeptember 2019September 2023Allow4831YesNo
16586742MANAGING PERMISSIONS TO CLOUD-BASED RESOURCES WITH SESSION-SPECIFIC ATTRIBUTESSeptember 2019September 2022Allow3520YesNo
16493719METHOD FOR OPERATING A TRANSMITTING DEVICE OF A MOTOR VEHICLE, TRANSMITTING DEVICE FOR A MOTOR VEHICLE, AND MOTOR VEHICLESeptember 2019January 2022Allow2800YesNo
16555975NETWORK SECURITY THREAT INTELLIGENCE SHARINGAugust 2019September 2022Allow3720YesNo
16484485IDENTIFICATION INFORMATION MANAGEMENT METHOD AND ELECTRONIC DEVICE SUPPORTING SAMEAugust 2019July 2022Allow3520YesNo
16465474MIXED-MODE CLOUD ON-PREMISE SECURE COMMUNICATIONMay 2019December 2021Allow3110NoNo
16422591SECURE AUTHENTICATION IN ADVERSE ENVIRONMENTSMay 2019December 2023Allow5540YesNo
16405308POLICY ENFORCEMENT AND INTROSPECTION ON AN AUTHENTICATION SYSTEMMay 2019January 2022Allow3210YesNo
16399865SYSTEM AND METHOD FOR RESOURCE ACCESS AUTHENTICATIONApril 2019December 2023Allow5660YesNo
16390390CROSS-CHAIN INTERACTIONS USING A DOMAIN NAME SCHEME IN BLOCKCHAIN SYSTEMSApril 2019January 2020Allow910YesNo
16363673AUTHENTICATION IN A COMPUTER NETWORK SYSTEMMarch 2019September 2021Allow3010YesNo
16358161CYBER SECURITY PLATFORM AND METHODMarch 2019February 2023Allow4640YesNo
16297186ONLINE ACCOUNT ACCESS CONTROL BY MOBILE DEVICEMarch 2019November 2019Allow910YesNo
16288453SYMMETRIC ACCOUNT AUTHENTICATIONFebruary 2019April 2023Allow4920YesYes
16286366ADAPTIVE AUTHORIZATION USING ACCESS TOKENFebruary 2019November 2021Allow3320YesNo
16203563INTELLIGENT POP-UP BLOCKERNovember 2018July 2021Allow3110YesNo
16203449DATA LEAK PREVENTION USING CONTENT BASED SEGMENTATION SCANNINGNovember 2018September 2021Allow3410YesNo
16146629SYSTEM AND METHOD FOR PC AS A SERVICE AUTHENTICATION AND SUBSCRIPTION VIA LOW POWER WIDE AREA NETWORK COMMUNICATIONSSeptember 2018March 2022Allow4120YesNo
16146587DETECTING FRAME INJECTION THROUGH WEB PAGE ANALYSISSeptember 2018April 2021Allow3110YesNo
16126023SYSTEM AND METHOD FOR SECURE SYNCHRONIZATION OF DATA ACROSS MULTIPLE COMPUTING DEVICESSeptember 2018August 2019Allow1110NoNo
16113471SECURE INTERFACE FOR INVOKING PRIVILEGED OPERATIONSAugust 2018September 2021Allow3720YesNo
16110365MOBILE AUTHENTICATION IN MOBILE VIRTUAL NETWORKAugust 2018March 2021Allow3110YesNo
16100233GLOBAL SIGN-OUT ON SHARED DEVICESAugust 2018December 2021Abandon4020YesNo
16028515SINGLE-SIGN-ON FOR THIRD PARTY MOBILE APPLICATIONSJuly 2018October 2021Allow3930YesNo
16028709AUTHENTICATING A USER VIA A CUSTOMIZED IMAGE-BASED CHALLENGEJuly 2018March 2023Allow5650YesNo
16027681SECURE COMMUNICATION BETWEEN IN-VEHICLE ELECTRONIC CONTROL UNITSJuly 2018July 2021Allow3620YesNo
16002990METHODS AND SYSTEMS FOR DEVICE AUTHENTICATIONJune 2018December 2020Allow3130YesNo
15965544MIGRATION FOR WEARABLE TO NEW COMPANION DEVICEApril 2018January 2023Allow5740YesNo
15965352PASSTHOUGHT FOR MULTIFACTOR AUTHENTICATION IN AUGMENTED REALITYApril 2018October 2021Allow4140YesNo
15919638MULTIFACTOR AUTHENTICATION FOR INTERNET-OF-THINGS DEVICESMarch 2018May 2021Allow3820YesNo
15919819PREVENTING UNAUTHORIZED ACCOUNT ACCESS BASED ON LOCATION AND TIMEMarch 2018September 2020Allow3010YesNo
15881953EMAIL NOTIFICATION SYSTEMJanuary 2018April 2023Allow6020YesYes
15878076AUTOMATIC SQL QUERY MODIFICATION FOR DATA RESTRICTIONJanuary 2018December 2018Allow1000YesNo
15867571STORAGE INTERFACE FOR SYNCHRONIZING CONTENTJanuary 2018December 2020Allow3520YesNo
15867586EMAIL NOTIFICATION SYSTEMJanuary 2018March 2021Allow3830YesNo
15838020DEVICE AUTHORIZATION USING SYMMETRIC KEY SYSTEMS AND METHODSDecember 2017July 2020Abandon3101NoNo
15805799ACCESS CONTROL TO COMPUTER RESOURCENovember 2017November 2019Allow2420NoNo
15797065Evaluation of Anomaly Detection Algorithms Using Impersonation Data Derived from User DataOctober 2017December 2020Allow3740YesNo
15795800APPARATUS AND METHOD TO PERFORM SECURE DATA SHARING IN A DISTRIBUTED NETWORK BY USING A BLOCKCHAINOctober 2017March 2021Allow4140YesNo
15793659NETWORK SECURITY SYSTEM WITH COGNITIVE ENGINE FOR DYNAMIC AUTOMATIONOctober 2017December 2019Allow2610YesNo
15569196WEARABLE DISCOVERY FOR AUTHENTICATIONOctober 2017July 2020Allow3330YesNo
15790140SYSTEM AND METHOD FOR VERIFICATION OF DATA TRANSFERRED AMONG SEVERAL DATA STORAGESOctober 2017November 2020Allow3630YesNo
15788755EFFICIENT SECURITY THREAT REMEDIATIONOctober 2017July 2020Abandon3320NoNo
15565778SYSTEMS, METHODS, AND DEVICES FOR DEVICE CREDENTIAL PROTECTIONOctober 2017March 2021Abandon4130NoNo
15724942ENABLING INTEGRITY AND AUTHENTICITY OF DESIGN DATAOctober 2017February 2021Allow4140YesNo
15710910ACCESS CONTROL TO COMPUTER RESOURCESeptember 2017June 2019Allow2110YesNo
15710732DETECTING BEHAVIORAL ANOMALY IN MACHINE LEARNED RULE SETSSeptember 2017March 2020Allow3020YesNo
15709474BIOMETRIC AUTHENTICATION BASED ON GAIT PATTERN OR WRITING MOTION WITH AN INERTIAL MEASUREMENT UNITSeptember 2017September 2019Allow2410YesNo
15708349METHOD AND SYSTEM FOR DOUBLE ANONYMIZATION OF DATASeptember 2017April 2020Allow3120YesNo
15708972ELECTRONIC DEVICES AND METHODS SUPPORTING UNSECURED SYSTEM-ON-CHIP SECURE BOOT FUNCTIONALITIESSeptember 2017January 2020Allow2810YesNo
15556105DEVICE, AUTHENTICATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCTSeptember 2017November 2019Allow2710YesNo
15688508DATA SOURCE DRIVEN EXPECTED NETWORK POLICY CONTROLAugust 2017October 2022Allow6040YesYes
15685061PASSCODE BASED ACCESS-CONTROL WITH RANDOMIZED LIMITSAugust 2017September 2020Allow3730YesNo
15685651INFORMATION PROCESSING DEVICE AND CONTROL METHOD FOR INFORMATION PROCESSING DEVICEAugust 2017June 2020Abandon3420NoNo
15552915OUTPUT APPARATUS, PROGRAM, OUTPUT SYSTEM, AND OUTPUT METHODAugust 2017January 2021Abandon4040NoNo
15551313Multi-Stage Defense-Aware Security Modules Placement in the CloudAugust 2017May 2019Allow2110YesNo
15551109Mining SandboxesAugust 2017May 2020Abandon3320NoNo
15549505A METHOD OF ESTABLISHING TRUST BETWEEN A DEVICE AND AN APPARATUSAugust 2017September 2020Allow3830YesNo
15669845DIGITAL CERTIFICATES WITH DISTRIBUTED USAGE INFORMATIONAugust 2017June 2019Allow2210YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner MOHAMMADI, FAHIMEH M.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
8
Examiner Affirmed
2
(25.0%)
Examiner Reversed
6
(75.0%)
Reversal Percentile
89.0%
Higher than average

What This Means

With a 75.0% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.

Strategic Value of Filing an Appeal

Total Appeal Filings
20
Allowed After Appeal Filing
10
(50.0%)
Not Allowed After Appeal Filing
10
(50.0%)
Filing Benefit Percentile
78.5%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 50.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner MOHAMMADI, FAHIMEH M - Prosecution Strategy Guide

Executive Summary

Examiner MOHAMMADI, FAHIMEH M works in Art Unit 2439 and has examined 278 patent applications in our dataset. With an allowance rate of 78.4%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 35 months.

Allowance Patterns

Examiner MOHAMMADI, FAHIMEH M's allowance rate of 78.4% places them in the 48% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.

Office Action Patterns

On average, applications examined by MOHAMMADI, FAHIMEH M receive 2.26 office actions before reaching final disposition. This places the examiner in the 59% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by MOHAMMADI, FAHIMEH M is 35 months. This places the examiner in the 39% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +56.5% benefit to allowance rate for applications examined by MOHAMMADI, FAHIMEH M. This interview benefit is in the 95% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 29.2% of applications are subsequently allowed. This success rate is in the 57% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 20.0% of cases where such amendments are filed. This entry rate is in the 26% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 20.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 28% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 66.7% of appeals filed. This is in the 49% percentile among all examiners. Of these withdrawals, 31.2% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 25.0% are granted (fully or in part). This grant rate is in the 12% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 15% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 19% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.