USPTO Examiner TOLENTINO RODERICK - Art Unit 2439

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19025713INFORMATION OUTPUT DEVICE, INFORMATION OUTPUT METHOD, AND RECORDING MEDIUMJanuary 2025April 2025Allow300YesNo
18982812REAL-TIME ANOMALY DETECTION AND MITIGATION FOR STREAMING FUNCTIONAL DATADecember 2024March 2025Allow300YesNo
18975491ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCEDecember 2024February 2025Allow200YesNo
18951202SECURE COMMUNICATIONS IN INTERACTIVE COMPUTING ENVIRONMENTNovember 2024January 2025Allow200NoNo
18823485Management System for Networked EndpointsSeptember 2024November 2024Allow200YesNo
18820411WEIGHTED TIMES SERIES FREQUENCY - INVERSE DOCUMENT FREQUENCY SCORING FOR CYBERSECURITY ALERTSAugust 2024December 2024Allow410NoNo
18796334ABNORMAL BEHAVIOR DETECTION METHOD, ELECTRONIC DEVICE AND NON-TRANSIENT COMPUTER-READABLE STORAGE MEDIUMAugust 2024April 2025Allow820YesNo
18763469MULTI-DIMENSIONAL ANOMALY SOURCE DETECTIONJuly 2024January 2025Allow610YesNo
18733767METHOD FOR DETECTING ANOMALIES IN GROUPS OF USER VERIFICATION REQUESTSJune 2024November 2024Allow510YesNo
18665845VULNERABILITY DETECTION PLATFORMMay 2024January 2025Allow810YesNo
18649492TECHNIQUES FOR MAPPING SECURITY CONTROLS TO CYBER THREATSApril 2024October 2024Allow510NoNo
18647831IOT DEVICE INSPECTION METHOD, AND DEVICE THEREFORApril 2024October 2024Allow610NoNo
18628581SYSTEMS AND METHODS FOR DYNAMIC VALUATION OF PROTECTION PRODUCTSApril 2024October 2024Allow710YesNo
18621304TECHNIQUES FOR CYBERSECURITY INVESTIGATION OF CLOUD ENTITY MISUSE LEVERAGING RUNTIME CONTEXTMarch 2024October 2024Allow710NoNo
18603590ACCESS GATEWAY SYSTEM FOR ACCESSING A RESOURCEMarch 2024August 2024Allow510YesNo
18581424ENDOGENOUS DYNAMIC DEFENSE ARCHITECTURE-BASED MULTI-OBJECTIVE SERVICE FUNCTION CHAIN DEPLOYMENT METHODFebruary 2024April 2024Allow200NoNo
18425847APPLICATION ENDPOINT CYBERSECURITY TECHNIQUESJanuary 2024August 2024Allow610NoNo
18420458TTP BASED AUTOMATED PLAYBOOK GENERATION METHOD AND SYSTEM PERFORMING THE SAMEJanuary 2024August 2024Allow710YesNo
18400591Secure AuthenticationDecember 2023December 2024Allow1120YesNo
18392906CYBERSECURITY VULNERABILITY VALIDATION TECHNIQUES UTILIZING RUNTIME DATA, STATIC ANALYSIS AND DYNAMIC INSPECTIONDecember 2023May 2024Allow510NoNo
18502556DATA PROVENANCE TRACKING SERVICENovember 2023June 2025Allow1900YesNo
18387322CYBER SECURITY APPLIANCE FOR AN OPERATIONAL TECHNOLOGY NETWORKNovember 2023March 2025Allow1600YesNo
18500845ARTIFICIAL INTELLIGENCE (AI) DRIVEN CLASSIFIER USING DEFINED TAXONOMY FRAMEWORKNovember 2023April 2024Allow510NoNo
18493945SYSTEM AND METHOD FOR RISK EVALUATION AND REPUTATIONAL SCORING OF SOCIAL MEDIA ACCOUNTSOctober 2023February 2025Allow1600NoNo
18383376Data Management System for Networked EndpointsOctober 2023May 2024Allow710YesNo
18489097ONLINE ANOMALY DETECTION OF VECTOR EMBEDDINGSOctober 2023December 2024Allow1400YesNo
18380339MALWARE DETECTION AT ENDPOINT DEVICESOctober 2023November 2024Allow1300NoNo
18485297SYSTEM AND METHOD FOR ANOMALY DETECTION INTERPRETATIONOctober 2023February 2025Allow1610NoNo
18468149TECHNIQUES FOR MULTI-TENANT VULNERABILITY SCANNINGSeptember 2023January 2024Allow410NoNo
18465605DIGITAL SAFETY AND ACCOUNT DISCOVERYSeptember 2023September 2024Allow1200NoNo
18236725SECURE USER ASSIGNED DEVICE FROM MANUFACTURERAugust 2023January 2025Allow1710YesNo
18361564ISOLATING SUSPICIOUS LINKS IN EMAIL MESSAGESJuly 2023January 2024Allow610YesNo
18220532PRIORITY DETERMINATION SYSTEM, PRIORITY DETERMINATION METHOD, AND RECORDING MEDIUMJuly 2023September 2024Allow1410NoNo
18340213REFERENCING A DOCUMENT IN A VIRTUAL SPACEJune 2023August 2024Allow1400YesNo
18339738MALWARE DETECTION FOR PROXY SERVER NETWORKSJune 2023November 2024Allow1710YesNo
18327663System and Method for Trustworthy Internet WhitelistsJune 2023June 2024Allow1200YesNo
18325230THREAT MITIGATION SYSTEM AND METHODMay 2023June 2024Allow1300YesNo
18313878Systems and Methods for Attack Simulation on a Production NetworkMay 2023May 2024Allow1200YesNo
18142522DETECTING MALICIOUS ACTIVITY ON AN ENDPOINT BASED ON REAL-TIME SYSTEM EVENTSMay 2023April 2024Allow1200YesNo
18302122Anomaly detection from network trafficApril 2023June 2025Allow2610YesNo
18301862TECHNIQUES FOR EFFICIENT NETWORK SECURITY FOR A WEB SERVER USING ANOMALY DETECTIONApril 2023August 2024Allow1610YesNo
18296888METHOD AND BLOCKCHAIN-BASED SYSTEM FOR MANAGING CREDENTIALS IN BATCH WITH SELECTIVE ATTRIBUTES DISCLOSURE/HIDING AND AUDITABLE MERKLE TREEApril 2023October 2023Allow610YesNo
18116518Systems And Methods For Intelligently Accessing Media Content Based On RightsMarch 2023March 2024Allow1200YesNo
18166654METHODS AND SYSTEMS FOR IDENTIFYING ANOMALOUS COMPUTER EVENTS TO DETECT SECURITY INCIDENTSFebruary 2023April 2025Allow2610YesNo
18105557Mutually secure optical data network and methodFebruary 2023February 2024Allow1300YesNo
18162802Digital Safety and Account DiscoveryFebruary 2023February 2024Allow1300NoNo
18104431MULTIDIMENSIONAL SECURITY SITUATION REAL-TIME REPRESENTATION METHOD AND SYSTEM AND APPLICABLE TO NETWORK SECURITYFebruary 2023August 2023Allow600NoNo
18101773ATTACK PATH GENERATION METHOD AND ATTACK PATH GENERATION DEVICEJanuary 2023May 2025Allow2810YesNo
18102026IDENTIFYING SIMILAR GEOGRAPHICALLY PROXIMATE INFRASTRUCTURES FROM A KNOWN NETWORK ADDRESSJanuary 2023January 2025Allow2400YesNo
18101961DAMPENING TOKEN ALLOCATIONS BASED ON NON-ORGANIC SUBSCRIBER BEHAVIORSJanuary 2023June 2024Allow1710NoNo
18094248BUILDING A TIME DIMENSION BASED ON A TIME DATA MODEL AND CREATING AN ASSOCIATION RELATIONSHIP BETWEEN THE TIME DIMENSION AND A SECOND DATA MODEL FOR ANALYZING DATA IN THE TIME DIMENSIONJanuary 2023June 2025Allow2920YesNo
18068428METHOD AND SYSTEM FOR STOPPING MULTI-VECTOR PHISHING ATTACKS USING CLOUD POWERED ENDPOINT AGENTSDecember 2022October 2024Allow2200YesNo
18065302MULTI-FACTOR AUTONOMOUS SIM LOCKDecember 2022April 2024Allow1610NoNo
18077148CONTACTLESS CARD WITH MULTIPLE ROTATING SECURITY KEYSDecember 2022July 2024Allow1910YesNo
18059737DYNAMIC AND LEAST-PRIVILEGE ACCESS TO SECURE NETWORK RESOURCES USING EPHEMERAL CREDENTIALSNovember 2022November 2023Allow1230YesNo
18051533DIGITAL SAFETY AND ACCOUNT DISCOVERYNovember 2022June 2023Allow700NoNo
17964885BEHAVIORAL BASELINING FROM A DATA SOURCE PERSPECTIVE FOR DETECTION OF COMPROMISED USERSOctober 2022June 2023Allow800YesNo
17918119INTERNET ACCESS MANAGEMENT SERVICE SERVER CAPABLE OF PROVIDING INTERNET ACCESS MANAGEMENT SERVICE BASED ON TERMINAL GROUPING AND OPERATING METHOD THEREOFOctober 2022April 2023Allow610NoNo
17959741Secure Execution Support for A.I. Systems (and other Heterogeneous Systems)October 2022October 2024Allow2440YesNo
17945892MALWARE DETECTION FOR PROXY SERVER NETWORKSSeptember 2022March 2023Allow610NoNo
17943440VALIDATION OF IPXE SCRIPTS USING OWNER CERTIFICATES AND OWNERSHIP VOUCHERSSeptember 2022April 2024Allow1910YesNo
17942571SYSTEMS AND METHODS FOR ENHANCED NETWORK DETECTIONSeptember 2022May 2023Allow800YesNo
17900283PRIORITY DETERMINATION SYSTEM, PRIORITY DETERMINATION METHOD, AND RECORDING MEDIUMAugust 2022April 2023Allow710YesNo
17886822ELECTRONIC SECURITY SYSTEM OF NETWORK RESOURCE COMPONENT TRACKING AND ANALYSIS ACROSS A DISTRIBUTED NETWORK AND CONSTRUCTION OF A VALIDATED NETWORK RESOURCE COMPONENT LIBRARYAugust 2022July 2024Allow2300YesNo
17795564SYSTEM AND METHOD FOR DETECTION AND PREVENTION OF CYBER ATTACKS AT IN-VEHICLE NETWORKSJuly 2022September 2024Allow2510YesNo
17869792SYSTEM AND METHOD FOR CONTROLLING ACCESS TO AN IN-VEHICLE COMMUNICATION NETWORKJuly 2022April 2023Allow900YesNo
17861732INFORMATION SECURITY COMPLIANCE PLATFORMJuly 2022February 2024Allow1910YesNo
17810424METHOD FOR PROTECTING A MACHINE LEARNING MODEL FROM A SIDE CHANNEL ATTACKJuly 2022July 2024Allow2410NoNo
17852976INFLIGHT NETWORK DATA ENCRYPTIONJune 2022July 2024Allow2510YesNo
17848986THREAT MITIGATION SYSTEM AND METHODJune 2022August 2022Allow200YesNo
17842940METHODS, SYSTEMS, AND DEVICES TO VALIDATE IP ADDRESSESJune 2022November 2024Allow2900NoNo
17837335SECURITY INFORMATION VISUALIZATION DEVICE, SECURITY INFORMATION VISUALIZATION METHOD, AND STORAGE MEDIUM FOR STORING PROGRAM FOR VISUALIZING SECURITY INFORMATIONJune 2022September 2023Allow1530YesNo
17828678MALWARE DETECTION FOR PROXY SERVER NETWORKSMay 2022July 2022Allow200NoNo
17755865Human Verification Based on Trans-Saccadic MemoryMay 2022September 2024Abandon2810NoNo
17731330System and method for electronic risk analysis and remediation using network monitored sensors and actionable feedback methodologies for operational resilienceApril 2022March 2023Allow1100YesNo
17724970ATTACK MONITORING CENTER APPARATUS AND ATTACK MONITORING TERMINAL APPARATUSApril 2022January 2025Allow3320YesNo
17723518Real-time detection and prevention of online new-account creation fraud and abuseApril 2022June 2025Allow3820YesNo
17724039INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHODApril 2022June 2024Allow2610YesNo
17754854TECHNIQUES FOR EFFICIENT NETWORK SECURITY FOR A WEB SERVER USING ANOMALY DETECTIONApril 2022January 2023Allow900NoNo
17655439COGNITIVE MALWARE AWARENESS IMPROVEMENT WITH CYCLAMATESMarch 2022February 2024Allow2310YesNo
17681343ON-DEVICE EXPERIMENTATIONFebruary 2022January 2024Allow2300NoNo
17680529Real-Time Validation of Data Transmissions Based on Security ProfilesFebruary 2022March 2023Allow1200NoNo
17681531GRAPH-BASED ANALYSIS OF SECURITY INCIDENTSFebruary 2022April 2024Allow2610YesNo
17679550DETECTING MASS CONTROL PLANE OPERATIONSFebruary 2022February 2025Allow3630YesNo
17636283RISK CONTROL METHOD, COMPUTER DEVICE, AND READABLE STORAGE MEDIUMFebruary 2022April 2025Allow3840YesNo
17672093SYSTEM AND METHOD FOR AUTHENTICATING THE RECEIVING END OF DATA TRANSMISSION VIA LIFI AND HOLOCHAIN NETWORKFebruary 2022June 2024Allow2710NoNo
17670457AUTOMATING DISCOVERY OF PATENTABLE SUBJECT MATTERFebruary 2022July 2024Abandon2910NoNo
17648970METHOD AND SYSTEM FOR GRAPH-BASED APPLICATION MODELINGJanuary 2022December 2023Allow2300NoNo
17567431SYSTEMS AND METHODS AUTHENTICATING A DIGITALLY SIGNED ASSERTION USING VERIFIED EVALUATORSJanuary 2022June 2023Allow1710YesNo
17565266REFERENCING A DOCUMENT IN A VIRTUAL SPACEDecember 2021March 2023Allow1530YesNo
17556935SECURE DATA CONTENT ACCESS SYSTEM AND METHODDecember 2021March 2024Allow2710YesNo
17556732ESTABLISHMENT OF BATTERY-FREE INSERT ACCESS TO SECURE NETWORKDecember 2021August 2024Allow3220YesNo
17524763NETWORK RESOURCE ACCESS SYSTEM AND METHOD, USER PORTAL AND RESOURCE PORTALNovember 2021December 2022Allow1320YesNo
17523748PROCESS IDENTIFIER TRANSITION MONITORING AND ASSESSMENTNovember 2021March 2023Allow1610NoNo
17520594AUTOMATIC GRAPH-BASED DETECTION OF POTENTIAL SECURITY THREATSNovember 2021November 2023Allow2400NoNo
17519656DEVICE AND SYSTEMS FOR STRONG IDENTITY AND STRONG AUTHENTICATIONNovember 2021May 2024Abandon3010NoNo
17514487SYSTEMS AND METHODS FOR CAUSALITY-BASED MULTIVARIATE TIME SERIES ANOMALY DETECTIONOctober 2021January 2024Allow2710YesNo
17498209SECURE SESSION SHARING BETWEEN COMPUTING DEVICESOctober 2021February 2023Allow1600YesNo
17438171MANAGING A SSO SESSION BY AN IDENTITY PROVIDERSeptember 2021May 2024Allow3220YesNo
17469465REAL-TIME CYBERSECURITY MONITORING OF INFLIGHT ENTERTAINMENT SYSTEMSSeptember 2021January 2024Allow2910YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner TOLENTINO, RODERICK.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
34
Examiner Affirmed
25
(73.5%)
Examiner Reversed
9
(26.5%)
Reversal Percentile
41.1%
Lower than average

What This Means

With a 26.5% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
106
Allowed After Appeal Filing
30
(28.3%)
Not Allowed After Appeal Filing
76
(71.7%)
Filing Benefit Percentile
38.7%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 28.3% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner TOLENTINO, RODERICK - Prosecution Strategy Guide

Executive Summary

Examiner TOLENTINO, RODERICK works in Art Unit 2439 and has examined 716 patent applications in our dataset. With an allowance rate of 79.9%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 31 months.

Allowance Patterns

Examiner TOLENTINO, RODERICK's allowance rate of 79.9% places them in the 42% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.

Office Action Patterns

On average, applications examined by TOLENTINO, RODERICK receive 2.39 office actions before reaching final disposition. This places the examiner in the 82% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by TOLENTINO, RODERICK is 31 months. This places the examiner in the 36% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +33.8% benefit to allowance rate for applications examined by TOLENTINO, RODERICK. This interview benefit is in the 85% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 25.3% of applications are subsequently allowed. This success rate is in the 30% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 21.9% of cases where such amendments are filed. This entry rate is in the 20% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 94.1% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 67% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 67.0% of appeals filed. This is in the 47% percentile among all examiners. Of these withdrawals, 46.4% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 30.9% are granted (fully or in part). This grant rate is in the 23% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 2.2% of allowed cases (in the 79% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 16% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Expect multiple rounds of prosecution: This examiner issues more office actions than average. Address potential issues proactively in your initial response and consider requesting an interview early in prosecution.
  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.
  • Examiner cooperation: This examiner frequently makes examiner's amendments to place applications in condition for allowance. If you are close to allowance, the examiner may help finalize the claims.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.