USPTO Examiner BECHTEL KEVIN M - Art Unit 2491

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18901801AUTOMATED PREEMPTIVE POLYMORPHIC DECEPTIONSeptember 2024March 2025Allow510YesNo
18438197METHOD OF CONSORTIUM HASHINGFebruary 2024July 2024Allow610YesNo
18536591METHOD OF CONSORTIUM HASHINGDecember 2023July 2024Abandon710NoNo
18523602SYSTEMS AND METHODS FOR LINKING SECURITY ACCOUNTS TO APPLICATION ACCOUNTS AND CONVERGING MULTIPLE IDENTITY SYSTEMSNovember 2023June 2025Allow1800YesNo
18514199Protections Against Command Line Security VulnerabilitiesNovember 2023January 2024Allow200NoNo
18467015FILE ACCESS METHOD, COMMUNICATION SYSTEM, AND ELECTRONIC DEVICESeptember 2023June 2025Allow2100NoNo
18244599SENSITIVE STORED PROCEDURE IDENTIFICATION IN REAL-TIME AND WITHOUT DATA EXPOSURESeptember 2023June 2025Allow2100NoNo
18338258METHOD AND SYSTEM FOR RUNTIME INTEGRITY CHECKJune 2023October 2023Allow401YesNo
18330584ELECTRONIC DEVICE AND SECURE BOOTING METHOD THEREOFJune 2023April 2025Allow2200YesNo
18329118SECURITY FOR POWER SUPPLY UNIT MICROCONTROLLERSJune 2023May 2025Allow2301YesNo
18204257INTEGRATED SECURITY WORKBENCHMay 2023June 2025Allow2401YesNo
18200677MULTI-LEVELED DATA TRANSFERMay 2023March 2025Allow2200YesNo
18035867SECURE COMPUTATION SYSTEM, SECURE COMPUTATION SERVER APPARATUS, SECURE COMPUTATION METHOD, AND SECURE COMPUTATION PROGRAMMay 2023February 2025Allow2100YesNo
18310506BLOCKCHAIN SYSTEMS AND METHODS FOR USER AUTHENTICATIONMay 2023April 2025Allow2300YesNo
18125420SYSTEM FOR ELECTRONIC DATA OBFUSCATION AND PROTECTION USING INDEPENDENT DESTRUCTIBLE DATA OBJECTSMarch 2023August 2024Allow1700YesNo
18165667AUTHENTICATION OF DEVICE IN NETWORK USING CRYPTOGRAPHIC CERTIFICATEFebruary 2023June 2025Allow2810YesNo
18153137DYNAMIC AND MODULAR DATA CLASSIFICATION ENGINEJanuary 2023September 2024Allow2001YesNo
18015264SLICE-SPECIFIC SECURITY REQUIREMENT INFORMATIONJanuary 2023June 2025Allow3021YesNo
18089524Multi-Project Chip, Methods of Making, and Using the SameDecember 2022June 2025Abandon3011NoNo
18086626REVERSE WEBHOOK AUTHENTICATIONDecember 2022January 2025Allow2500NoNo
18082837MASKING OF KEY GENERATION OPERATIONS WITH RANDOM MATRICES IN CRYPTOGRAPHIC APPLICATIONSDecember 2022September 2024Allow2100NoNo
18082052Methods, Systems and Computer Program Products for Generation and Transfer of Non-Fungible TokensDecember 2022May 2025Allow2910NoNo
18062535SYSTEMS AND METHODS FOR MANAGING KEYS OF DIGITAL CERTIFICATESDecember 2022September 2024Allow2100YesNo
18076317WAN OPTIMIZATION FOR ENCRYPTED DATA TRAFFIC USING FULLY HOMOMORPHIC ENCRYPTIONDecember 2022September 2024Allow2200NoNo
18070666SECURE PASSWORD GENERATION AND MANAGEMENT USING NFC AND CONTACTLESS SMART CARDSNovember 2022April 2025Allow2820YesNo
17993824MONITORING CODE PROVENANCENovember 2022January 2025Allow2510YesNo
17992808CROSS-CHAIN DATA TRANSMISSION METHOD AND APPARATUS, COMPUTER DEVICE, STORAGE MEDIUM, AND COMPUTER PROGRAM PRODUCTNovember 2022September 2024Allow2200NoNo
17991026Security Analytics System for Performing an Interaction Classification OperationNovember 2022May 2025Allow4020YesNo
18056489TRANSIENT OBJECT REFERENCESNovember 2022December 2023Allow1320NoNo
18052286ENABLING PERSISTENCE IN A VOLATILE SECURE WORKSPACENovember 2022January 2025Allow2711NoNo
18052267LABEL RECOMMENDATION FOR CYBERSECURITY CONTENTNovember 2022February 2025Allow2711YesNo
18052240System and Method for Evaluating Penetration Testing ToolsNovember 2022April 2025Allow2920YesNo
17973022Integrations Platform with Interaction and Abstraction with a Third Party PlatformOctober 2022October 2024Allow3301NoNo
17971010Secure Browsing Via A Transparent Network ProxyOctober 2022February 2025Allow2820YesNo
18046341Ransomware-Aware Solid-State DriveOctober 2022May 2024Allow2000YesNo
17916943USER CENTRIC SYSTEM AND METHOD FOR INTERACTION BETWEEN HUMANS AND DEVICESOctober 2022February 2025Abandon2901NoNo
17957037SYSTEM AND METHOD OF IMAGED BASED LOGIN TO AN ACCESS DEVICESeptember 2022February 2025Allow2820YesNo
17945690Distributed Digital Rights Management (DRM) ProtectionSeptember 2022March 2025Allow3020YesNo
17932060SYSTEM AND METHOD FOR CENTRALIZED CYBERSECURITY CONFIGURATION COMPLIANCE MANAGEMENTSeptember 2022October 2024Allow2510NoNo
17900353Session Similarity IdentificationAugust 2022March 2025Allow3120YesNo
17899427Penetration Testing in Zero Trust Network EnvironmentAugust 2022June 2024Allow2200YesNo
17898287Security Risk Evaluation Across User DevicesAugust 2022January 2025Allow2920YesNo
17799557ONLINE SECRET ENCRYPTIONAugust 2022October 2024Allow2611YesNo
17884048SYSTEM AND METHOD FOR ANONYMIZING A PERSON CAPTURED IN AN IMAGEAugust 2022May 2024Allow2100NoNo
17814492SECURE COMMUNICATION SYSTEMJuly 2022October 2024Allow2710YesNo
17868227HOME DATA MANAGEMENTJuly 2022June 2024Allow2300YesNo
17863699SYSTEM AND METHOD EMPLOYING REDUCED TIME DEVICE PROCESSINGJuly 2022August 2024Allow2510YesNo
17843605Meeting Join for Meeting DeviceJune 2022April 2024Allow2200YesNo
17843340PRIVATE NETWORK REQUEST FORWARDINGJune 2022April 2024Allow2200YesNo
17746493PRIVATE NETWORK REQUEST FORWARDINGMay 2022April 2024Allow2300YesNo
17776573MULTIFACTOR AUTHENTICATION USING BLOCKCHAIN TRANSACTIONSMay 2022November 2024Allow3020YesNo
17733133COMPROMISE FREE CLOUD DATA ENCRYPTION AND SECURITYApril 2022December 2024Allow3220YesNo
17718572INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUMApril 2022March 2024Allow2310YesNo
17658056SECURE COMMUNICATION SYSTEMApril 2022April 2025Allow3721YesNo
17694540Data Access Gateway for Security and PrivacyMarch 2022February 2023Allow1120NoNo
17680977CODE MODIFICATION FOR DETECTING ABNORMAL ACTIVITYFebruary 2022March 2024Allow2500YesNo
17646779SECURE AUTHENTICATION FOR ACCESSING REMOTE RESOURCESJanuary 2022March 2024Allow2600YesNo
17644894Matrix Encryption - A Symmetric Key Encryption TechnologyDecember 2021May 2023Allow1700YesNo
17643781SYMMETRIC CROSS-REGION NETWORK DATA FLOW MANAGEMENTDecember 2021January 2024Allow2501YesNo
17516529AUTOMATED PREEMPTIVE POLYMORPHIC DECEPTIONNovember 2021June 2024Allow3210YesNo
17503818SYSTEMS AND METHODS FOR FILTERING NETWORK COMMUNICATIONS WITH A DEMILITARIZED ZONEOctober 2021September 2024Abandon3520YesNo
17487931RULE SET-BASED AUTHORIZATION FOR DATA POOLSeptember 2021February 2024Allow2810YesNo
17484971SYSTEMS, DEVICES AND METHODS FOR PROTECTING AND EXCHANGING ELECTRONIC COMPUTER FILESSeptember 2021November 2023Allow2600YesNo
17428809END-TO-END DOUBLE-RATCHET ENCRYPTION WITH EPOCH KEY EXCHANGEAugust 2021July 2023Allow2300YesNo
17381584COMMAND AUTHORITY EXTENSION SYSTEM AND METHOD FOR SECURITY PROTOCOL AND DATA MODEL (SPDM) SECURE COMMUNICATION CHANNELSJuly 2021June 2023Allow2300YesNo
17373686TRUSTED INDICATORS TO SECURE VISUAL OUTPUTSJuly 2021March 2024Allow3220YesNo
17357465SCREEN SHARING SESSION PRIVACY MANAGERJune 2021March 2024Allow3320YesNo
17356922METHOD FOR SECURELY UPDATING CONTROL UNITSJune 2021April 2023Allow2210YesNo
17348975DATA PROCESSING METHODS, APPARATUSES, AND DEVICESJune 2021May 2022Allow1120YesNo
17332184SYSTEM AND METHOD FOR BINDING APPLICATIONS TO A ROOT OF TRUSTMay 2021February 2023Allow2100YesNo
17331709ADAPTIVE OFFLINE POLICY ENFORCEMENT BASED ON CONTEXTMay 2021March 2023Allow2200YesNo
17328466SYSTEMS AND METHODS FOR EXTENDING BOOT SECURITY TRUST CHAINING TO STATE CHANGES BETWEEN BOOT SESSIONSMay 2021February 2023Allow2100YesNo
17328739Dual Level ManagementMay 2021August 2022Allow1501YesNo
17323430LICENSE-PROTECTED BOOT DEVICEMay 2021May 2023Allow2420YesNo
17245233DATABASE SECURITYApril 2021January 2023Allow2120YesNo
17242339ACCESS CONTROL MANAGEMENT OF BASEBOARD MANAGEMENT CONTROLLER PERIPHERALSApril 2021June 2022Allow1300NoNo
17230197EFFICIENT HARDWARE ARCHITECTURE FOR HIGHLY SECURE ISOGENY-BASED CRYPTOSYSTEMSApril 2021August 2021Allow410YesNo
17228507IDENTITY MANAGEMENT PROTOCOL ROUTERApril 2021November 2024Allow4340YesNo
17219392FUSE BASED REPLAY PROTECTION WITH CONSERVATIVE FUSE USAGEMarch 2021November 2022Allow2001YesNo
17211947INFORMATION SECURITY SYSTEM AND METHOD FOR ANOMALY DETECTION IN DATA TRANSMISSIONMarch 2021April 2022Allow1300YesNo
17212050INFORMATION SECURITY SYSTEM AND METHOD FOR INCOMPLIANCE DETECTION IN DATA TRANSMISSIONMarch 2021April 2022Allow1300YesNo
17211916INFORMATION SECURITY SYSTEM AND METHOD FOR SECURITY THREAT DETECTION IN DATA TRANSMISSIONMarch 2021April 2022Allow1300YesNo
17205560SECURITY SYSTEM AND METHOD FOR SOFTWARE TO BE INPUT TO A CLOSED INTERNAL NETWORKMarch 2021April 2022Allow1300YesNo
17195194BLOCKCHAIN SYSTEMS AND METHODS FOR USER AUTHENTICATIONMarch 2021January 2023Allow2300YesNo
17190760SYSTEM FOR ELECTRONIC DATA OBFUSCATION AND PROTECTION USING INDEPENDENT DESTRUCTIBLE DATA OBJECTSMarch 2021March 2023Allow2410NoNo
17181123Processor and Memory System to Selectively Enable CommunicationFebruary 2021February 2023Allow2430YesNo
17178228MONITORING CODE PROVENANCEFebruary 2021September 2022Allow1810YesNo
17178225DOCUMENTING AND ANNOTATING CODE ACTIVITIESFebruary 2021October 2022Allow2010YesNo
17150150METHODS AND APPARATUS FOR DYNAMIC DATA ACCESS PROVISIONINGJanuary 2021February 2023Allow2520YesNo
17255921SECURE-AWARE BUS SYSTEMDecember 2020February 2022Allow1400YesNo
17125327IMEI STORAGEDecember 2020September 2023Allow3320YesNo
17115688SYSTEM AND METHOD FOR USING A DISTRIBUTED LEDGER GATEWAYDecember 2020August 2022Allow2100YesNo
17114072SYSTEM AND METHOD FOR STORING, DELIVERING AND SCREENING VISUAL MEDIADecember 2020November 2024Abandon4740NoNo
17056388MULTI-MASTER SECURITY CIRCUITNovember 2020March 2023Allow2820YesNo
17096007Secure Browsing Via A Transparent Network ProxyNovember 2020July 2022Allow2000YesNo
17091944SECURE COMMUNICATION SYSTEMNovember 2020August 2023Allow3321YesNo
17063485CLOUD KEY MANAGEMENT FOR AFU SECURITYOctober 2020June 2022Allow2100NoNo
17027556Methods And Systems For Securing And Retrieving Sensitive Data Using Indexable DatabasesSeptember 2020December 2022Allow2610YesNo
17025848Security Risk Evaluation Across User DevicesSeptember 2020April 2022Allow1900YesNo
17022938PUBLISH-SUBSCRIBE BROKER NETWORK OVERLAY SYSTEMSeptember 2020February 2023Allow2911YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner BECHTEL, KEVIN M.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
16
Examiner Affirmed
15
(93.8%)
Examiner Reversed
1
(6.2%)
Reversal Percentile
20.6%
Lower than average

What This Means

With a 6.2% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
33
Allowed After Appeal Filing
1
(3.0%)
Not Allowed After Appeal Filing
32
(97.0%)
Filing Benefit Percentile
9.5%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 3.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner BECHTEL, KEVIN M - Prosecution Strategy Guide

Executive Summary

Examiner BECHTEL, KEVIN M works in Art Unit 2491 and has examined 507 patent applications in our dataset. With an allowance rate of 76.7%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 28 months.

Allowance Patterns

Examiner BECHTEL, KEVIN M's allowance rate of 76.7% places them in the 35% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.

Office Action Patterns

On average, applications examined by BECHTEL, KEVIN M receive 1.81 office actions before reaching final disposition. This places the examiner in the 55% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by BECHTEL, KEVIN M is 28 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +58.0% benefit to allowance rate for applications examined by BECHTEL, KEVIN M. This interview benefit is in the 97% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 32.5% of applications are subsequently allowed. This success rate is in the 62% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 7.1% of cases where such amendments are filed. This entry rate is in the 3% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 44.4% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 38% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 42.9% of appeals filed. This is in the 6% percentile among all examiners. Of these withdrawals, 75.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.

Petition Practice

When applicants file petitions regarding this examiner's actions, 22.3% are granted (fully or in part). This grant rate is in the 13% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.2% of allowed cases (in the 50% percentile). This examiner makes examiner's amendments less often than average. You may need to make most claim amendments yourself.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 2.1% of allowed cases (in the 66% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.