USPTO Examiner TOLENTINO RODERICK - Art Unit 2439

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19300512Methods for Internet Communication SecurityAugust 2025January 2026Allow500YesNo
19294714CONTEXTUAL TRUST ASSESSMENT OF ELECTRONIC MESSAGES USING LARGE LANGUAGE MODELS IN COMPUTERIZED ORGANIZATIONAL NETWORKSAugust 2025January 2026Allow610NoNo
19268121ELECTRONIC APPARATUS FOR PERFORMING LOG LIGHTWEIGHTING USING EXTENDED BLOOM FILTER, AND OPERATION METHOD THEREOFJuly 2025December 2025Allow510YesNo
19255270METHOD AND SYSTEM FOR CONSTRUCTING VECTOR DATABASES USED FOR CONVERTING FREE TEXT QUERIES TO CYBER LANGUAGE QUERIESJune 2025August 2025Allow200YesNo
19183089AI MULTI-DOMAIN INTEGRATED SYSTEM AND METHOD FOR AUTOMATIC GENERATION OF CYBER CRISIS SCENARIOApril 2025September 2025Allow510NoNo
19173436DETECTION OF ASSETS ACCESSIBLE VIA INBOUND NETWORK TRAFFICApril 2025October 2025Allow710YesNo
19094182ANOMALY DETECTION IN MANAGED NETWORKSMarch 2025August 2025Allow510NoNo
19088864PROCESSING REQUESTS FOR PRIVATE DATA FROM UNAUTHENTICATED USERSMarch 2025September 2025Allow510YesNo
19060868MULTI-DIMENSIONAL ANOMALY SOURCE DETECTIONFebruary 2025May 2025Allow200YesNo
19048394WEIGHTED TIMES SERIES FREQUENCY - INVERSE DOCUMENT FREQUENCY SCORING FOR CYBERSECURITY ALERTSFebruary 2025August 2025Allow610YesNo
19037886METHOD AND SYSTEM FOR IDENTIFYING ATTACK INFRASTRUCTUREJanuary 2025July 2025Allow610NoNo
19031245METHODS AND SYSTEMS FOR DETERMINING ANOMALOUS USER ACCESS TO DATA OBJECTSJanuary 2025June 2025Allow510NoNo
19025713INFORMATION OUTPUT DEVICE, INFORMATION OUTPUT METHOD, AND RECORDING MEDIUMJanuary 2025April 2025Allow300YesNo
18982812REAL-TIME ANOMALY DETECTION AND MITIGATION FOR STREAMING FUNCTIONAL DATADecember 2024March 2025Allow300YesNo
18975491ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCEDecember 2024February 2025Allow200YesNo
18951202SECURE COMMUNICATIONS IN INTERACTIVE COMPUTING ENVIRONMENTNovember 2024January 2025Allow200NoNo
18823485Management System for Networked EndpointsSeptember 2024November 2024Allow200YesNo
18820411WEIGHTED TIMES SERIES FREQUENCY - INVERSE DOCUMENT FREQUENCY SCORING FOR CYBERSECURITY ALERTSAugust 2024December 2024Allow410NoNo
18841556METHOD FOR DETERMINING FALSE FLAGS OF CYBER ATTACKS AND APPARATUS FOR EXECUTING THE METHODAugust 2024July 2025Allow1110YesNo
18796334ABNORMAL BEHAVIOR DETECTION METHOD, ELECTRONIC DEVICE AND NON-TRANSIENT COMPUTER-READABLE STORAGE MEDIUMAugust 2024April 2025Allow820YesNo
18781746ELECTRONIC SECURITY SYSTEM OF NETWORK RESOURCE COMPONENT TRACKING AND ANALYSIS ACROSS A DISTRIBUTED NETWORK AND CONSTRUCTION OF A VALIDATED NETWORK RESOURCE COMPONENT LIBRARYJuly 2024February 2026Allow1900YesNo
18780656MULTI-FACTOR AUTONOMOUS SIM LOCKJuly 2024March 2026Allow1900YesNo
18774171ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCEJuly 2024February 2026Allow1900YesNo
18772175APPLICATION PROXY-BASED SECURITY FOR RDP-TYPE COMMUNICATIONS SESSIONSJuly 2024March 2026Abandon2010NoNo
18763469MULTI-DIMENSIONAL ANOMALY SOURCE DETECTIONJuly 2024January 2025Allow610YesNo
18733767METHOD FOR DETECTING ANOMALIES IN GROUPS OF USER VERIFICATION REQUESTSJune 2024November 2024Allow510YesNo
18674018System and Method for Generative Design Based Real-Time Restricted Sub Application Setup with Non-Production Data Architectural Flow Determination with Enterprise Scoped Large Language Injection ModelMay 2024February 2026Allow2010YesNo
18665845VULNERABILITY DETECTION PLATFORMMay 2024January 2025Allow810YesNo
18652151DETECTING OUTLIERS IN MULTIMODAL DISTRIBUTIONS USING EMPIRICAL CUMULATIVE DISTRIBUTION FUNCTIONSMay 2024March 2026Allow2210NoNo
18648754ENCRYPTED INTERSTITIAL TECHNIQUES FOR WEB SECURITYApril 2024March 2026Allow2210NoNo
18649492TECHNIQUES FOR MAPPING SECURITY CONTROLS TO CYBER THREATSApril 2024October 2024Allow510NoNo
18647831IOT DEVICE INSPECTION METHOD, AND DEVICE THEREFORApril 2024October 2024Allow610NoNo
18631736COMPUTER METHOD FOR RANKED ENSEMBLE FILTERING OF COMPUTER NETWORK TRANSMISSIONSApril 2024October 2025Allow1800NoNo
18628581SYSTEMS AND METHODS FOR DYNAMIC VALUATION OF PROTECTION PRODUCTSApril 2024October 2024Allow710YesNo
18624317System and Method for Determining Network Pathway Security VulnerabilitiesApril 2024January 2026Allow2210NoNo
18621304TECHNIQUES FOR CYBERSECURITY INVESTIGATION OF CLOUD ENTITY MISUSE LEVERAGING RUNTIME CONTEXTMarch 2024October 2024Allow710NoNo
18617404DEDUPLICATION OF ENDPOINT CONNECTIONSMarch 2024November 2025Allow1910YesNo
18603590ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCEMarch 2024August 2024Allow510YesNo
18601572CYBERSECURITY OPERATIONS MITIGATION MANAGEMENTMarch 2024February 2026Allow2310YesNo
18599550TRUST PLATFORMMarch 2024March 2026Allow2410YesNo
18586982SYSTEMS AND METHODS FOR USE IN ASSESSMENTS IN CONNECTION WITH CYBER ATTACKSFebruary 2024February 2026Allow2310YesNo
18584994THREAT MITIGATION SYSTEM AND METHODFebruary 2024November 2025Allow2040YesNo
18581424ENDOGENOUS DYNAMIC DEFENSE ARCHITECTURE-BASED MULTI-OBJECTIVE SERVICE FUNCTION CHAIN DEPLOYMENT METHODFebruary 2024April 2024Allow200NoNo
18432037AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATSFebruary 2024August 2025Allow1900YesNo
18427616CYBER THREAT DEFENSE SYSTEM, COMPONENTS, AND A METHOD FOR USING ARTIFICIAL INTELLIGENCE MODELS TRAINED ON A NORMAL PATTERN OF LIFE FOR SYSTEMS WITH UNUSUAL DATA SOURCESJanuary 2024February 2026Allow2510NoNo
18425847APPLICATION ENDPOINT CYBERSECURITY TECHNIQUESJanuary 2024August 2024Allow610NoNo
18420458TTP BASED AUTOMATED PLAYBOOK GENERATION METHOD AND SYSTEM PERFORMING THE SAMEJanuary 2024August 2024Allow710YesNo
18416730API SECURITY BASED ON INSPECTION OF OBFUSCATED REQUEST AND RESPONSE BODIESJanuary 2024August 2025Allow1900YesNo
18414362OPTIMIZED DEEP PACKET INSPECTION (DPI) ANYWHEREJanuary 2024January 2026Allow2410YesNo
18412268SYSTEMS AND METHODS FOR FILTERING ELECTRONIC ACTIVITIES BY PARSING CURRENT AND HISTORICAL ELECTRONIC ACTIVITIESJanuary 2024January 2026Abandon2410NoNo
18410746AUTOMATED IDENTIFICATION OF FALSE POSITIVES IN DNS TUNNELING DETECTORSJanuary 2024September 2025Allow2010YesNo
18404173Evaluating Cryptographic API Calls at RuntimeJanuary 2024October 2025Allow2210YesNo
18400591Secure AuthenticationDecember 2023December 2024Allow1120YesNo
18398574SERVER AND METHOD FOR PROVIDING ONLINE THREAT DATA BASED ON USER-CUSTOMIZED KEYWORDS FOR PRIVATE CHANNELDecember 2023January 2026Allow2410NoNo
18392906CYBERSECURITY VULNERABILITY VALIDATION TECHNIQUES UTILIZING RUNTIME DATA, STATIC ANALYSIS AND DYNAMIC INSPECTIONDecember 2023May 2024Allow510NoNo
18526253INFERENCE-BASED SELECTIVE FLOW INSPECTIONDecember 2023December 2025Allow2410YesNo
18559569BLOCKCHAIN-BASED INTERCONNECTED VEHICLE AUTHENTICATION SYSTEM AND METHODNovember 2023July 2025Allow2100YesNo
18502556DATA PROVENANCE TRACKING SERVICENovember 2023June 2025Allow1900YesNo
18387322CYBER SECURITY APPLIANCE FOR AN OPERATIONAL TECHNOLOGY NETWORKNovember 2023March 2025Allow1600YesNo
18500845ARTIFICIAL INTELLIGENCE (AI) DRIVEN CLASSIFIER USING DEFINED TAXONOMY FRAMEWORKNovember 2023April 2024Allow510NoNo
18493945SYSTEM AND METHOD FOR RISK EVALUATION AND REPUTATIONAL SCORING OF SOCIAL MEDIA ACCOUNTSOctober 2023February 2025Allow1600NoNo
18383376Data Management System for Networked EndpointsOctober 2023May 2024Allow710YesNo
18489097ONLINE ANOMALY DETECTION OF VECTOR EMBEDDINGSOctober 2023December 2024Allow1400YesNo
18488336Data discovery dashboard for real-time data manipulation and visualizationOctober 2023October 2025Allow2410NoNo
18487700Protecting Against Malicious Websites Using Repetitive Data SignaturesOctober 2023October 2025Allow2410NoNo
18380339MALWARE DETECTION AT ENDPOINT DEVICESOctober 2023November 2024Allow1300NoNo
18485297SYSTEM AND METHOD FOR ANOMALY DETECTION INTERPRETATIONOctober 2023February 2025Allow1610NoNo
18376130SYSTEMS AND METHODS FOR DATA SECURITY MODEL MODIFICATION AND ANOMALY DETECTIONOctober 2023November 2025Allow2510NoNo
18372193SYSTEMS AND METHODS FOR ENHANCED NETWORK DETECTIONSeptember 2023July 2025Allow2230YesNo
18468149TECHNIQUES FOR MULTI-TENANT VULNERABILITY SCANNINGSeptember 2023January 2024Allow410NoNo
18467194SYSTEMS, APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ANOMOLY DETECTION COMPUTING PROGRAMSSeptember 2023December 2025Allow2710YesNo
18465605DIGITAL SAFETY AND ACCOUNT DISCOVERYSeptember 2023September 2024Allow1200NoNo
18236725SECURE USER ASSIGNED DEVICE FROM MANUFACTURERAugust 2023January 2025Allow1710YesNo
18365208MANAGING UNMANAGEABLE DEVICES ON AN ENTERPRISE NETWORKAugust 2023August 2025Allow2410YesNo
18361564ISOLATING SUSPICIOUS LINKS IN EMAIL MESSAGESJuly 2023January 2024Allow610YesNo
18261875ANOMALOUS NETWORK BEHAVIOUR IDENTIFICATIONJuly 2023November 2025Allow2820YesNo
18220532PRIORITY DETERMINATION SYSTEM, PRIORITY DETERMINATION METHOD, AND RECORDING MEDIUMJuly 2023September 2024Allow1410NoNo
18213337ATTACK PATH MONITORING AND RISK MITIGATION IN IDENTITY SYSTEMSJune 2023January 2026Allow3020YesNo
18340213REFERENCING A DOCUMENT IN A VIRTUAL SPACEJune 2023August 2024Allow1400YesNo
18339738MALWARE DETECTION FOR PROXY SERVER NETWORKSJune 2023November 2024Allow1710YesNo
18327663System and Method for Trustworthy Internet WhitelistsJune 2023June 2024Allow1200YesNo
18325230THREAT MITIGATION SYSTEM AND METHODMay 2023June 2024Allow1300YesNo
18324945SYSTEMS AND METHODS FOR TRIGGERING TOKEN ALERTSMay 2023November 2025Allow3020YesNo
18313878Systems and Methods for Attack Simulation on a Production NetworkMay 2023May 2024Allow1200YesNo
18142522DETECTING MALICIOUS ACTIVITY ON AN ENDPOINT BASED ON REAL-TIME SYSTEM EVENTSMay 2023April 2024Allow1200YesNo
18302122Anomaly detection from network trafficApril 2023June 2025Allow2610YesNo
18301862TECHNIQUES FOR EFFICIENT NETWORK SECURITY FOR A WEB SERVER USING ANOMALY DETECTIONApril 2023August 2024Allow1610YesNo
18132126DATA PROCESSING METHOD AND APPARATUS, ELECTRONIC DEVICE, AND MEDIUMApril 2023September 2025Allow2920YesNo
18296888METHOD AND BLOCKCHAIN-BASED SYSTEM FOR MANAGING CREDENTIALS IN BATCH WITH SELECTIVE ATTRIBUTES DISCLOSURE/HIDING AND AUDITABLE MERKLE TREEApril 2023October 2023Allow610YesNo
18116518Systems And Methods For Intelligently Accessing Media Content Based On RightsMarch 2023March 2024Allow1200YesNo
18166654METHODS AND SYSTEMS FOR IDENTIFYING ANOMALOUS COMPUTER EVENTS TO DETECT SECURITY INCIDENTSFebruary 2023April 2025Allow2610YesNo
18105557Mutually secure optical data network and methodFebruary 2023February 2024Allow1300YesNo
18104431MULTIDIMENSIONAL SECURITY SITUATION REAL-TIME REPRESENTATION METHOD AND SYSTEM AND APPLICABLE TO NETWORK SECURITYFebruary 2023August 2023Allow600NoNo
18162802Digital Safety and Account DiscoveryFebruary 2023February 2024Allow1300NoNo
18101961DAMPENING TOKEN ALLOCATIONS BASED ON NON-ORGANIC SUBSCRIBER BEHAVIORSJanuary 2023June 2024Allow1710NoNo
18102026IDENTIFYING SIMILAR GEOGRAPHICALLY PROXIMATE INFRASTRUCTURES FROM A KNOWN NETWORK ADDRESSJanuary 2023January 2025Allow2400YesNo
18101773ATTACK PATH GENERATION METHOD AND ATTACK PATH GENERATION DEVICEJanuary 2023May 2025Allow2810YesNo
18094248BUILDING A TIME DIMENSION BASED ON A TIME DATA MODEL AND CREATING AN ASSOCIATION RELATIONSHIP BETWEEN THE TIME DIMENSION AND A SECOND DATA MODEL FOR ANALYZING DATA IN THE TIME DIMENSIONJanuary 2023June 2025Allow2920YesNo
18068428METHOD AND SYSTEM FOR STOPPING MULTI-VECTOR PHISHING ATTACKS USING CLOUD POWERED ENDPOINT AGENTSDecember 2022October 2024Allow2200YesNo
18065302MULTI-FACTOR AUTONOMOUS SIM LOCKDecember 2022April 2024Allow1610NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner TOLENTINO, RODERICK.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
37
Examiner Affirmed
27
(73.0%)
Examiner Reversed
10
(27.0%)
Reversal Percentile
42.9%
Lower than average

What This Means

With a 27.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
123
Allowed After Appeal Filing
35
(28.5%)
Not Allowed After Appeal Filing
88
(71.5%)
Filing Benefit Percentile
41.7%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 28.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner TOLENTINO, RODERICK - Prosecution Strategy Guide

Executive Summary

Examiner TOLENTINO, RODERICK works in Art Unit 2439 and has examined 676 patent applications in our dataset. With an allowance rate of 77.1%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 35 months.

Allowance Patterns

Examiner TOLENTINO, RODERICK's allowance rate of 77.1% places them in the 44% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.

Office Action Patterns

On average, applications examined by TOLENTINO, RODERICK receive 2.63 office actions before reaching final disposition. This places the examiner in the 77% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by TOLENTINO, RODERICK is 35 months. This places the examiner in the 39% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +38.5% benefit to allowance rate for applications examined by TOLENTINO, RODERICK. This interview benefit is in the 86% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 24.8% of applications are subsequently allowed. This success rate is in the 37% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 22.0% of cases where such amendments are filed. This entry rate is in the 28% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 91.5% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 68% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 68.1% of appeals filed. This is in the 54% percentile among all examiners. Of these withdrawals, 44.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.

Petition Practice

When applicants file petitions regarding this examiner's actions, 39.2% are granted (fully or in part). This grant rate is in the 28% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 2.7% of allowed cases (in the 78% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 18% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Expect multiple rounds of prosecution: This examiner issues more office actions than average. Address potential issues proactively in your initial response and consider requesting an interview early in prosecution.
  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • Examiner cooperation: This examiner frequently makes examiner's amendments to place applications in condition for allowance. If you are close to allowance, the examiner may help finalize the claims.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.