Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18901801 | AUTOMATED PREEMPTIVE POLYMORPHIC DECEPTION | September 2024 | March 2025 | Allow | 5 | 1 | 0 | Yes | No |
| 18438197 | METHOD OF CONSORTIUM HASHING | February 2024 | July 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18536591 | METHOD OF CONSORTIUM HASHING | December 2023 | July 2024 | Abandon | 7 | 1 | 0 | No | No |
| 18523602 | SYSTEMS AND METHODS FOR LINKING SECURITY ACCOUNTS TO APPLICATION ACCOUNTS AND CONVERGING MULTIPLE IDENTITY SYSTEMS | November 2023 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18514199 | Protections Against Command Line Security Vulnerabilities | November 2023 | January 2024 | Allow | 2 | 0 | 0 | No | No |
| 18467015 | FILE ACCESS METHOD, COMMUNICATION SYSTEM, AND ELECTRONIC DEVICE | September 2023 | June 2025 | Allow | 21 | 0 | 0 | No | No |
| 18244599 | SENSITIVE STORED PROCEDURE IDENTIFICATION IN REAL-TIME AND WITHOUT DATA EXPOSURE | September 2023 | June 2025 | Allow | 21 | 0 | 0 | No | No |
| 18338258 | METHOD AND SYSTEM FOR RUNTIME INTEGRITY CHECK | June 2023 | October 2023 | Allow | 4 | 0 | 1 | Yes | No |
| 18330584 | ELECTRONIC DEVICE AND SECURE BOOTING METHOD THEREOF | June 2023 | April 2025 | Allow | 22 | 0 | 0 | Yes | No |
| 18329118 | SECURITY FOR POWER SUPPLY UNIT MICROCONTROLLERS | June 2023 | May 2025 | Allow | 23 | 0 | 1 | Yes | No |
| 18204257 | INTEGRATED SECURITY WORKBENCH | May 2023 | June 2025 | Allow | 24 | 0 | 1 | Yes | No |
| 18200677 | MULTI-LEVELED DATA TRANSFER | May 2023 | March 2025 | Allow | 22 | 0 | 0 | Yes | No |
| 18035867 | SECURE COMPUTATION SYSTEM, SECURE COMPUTATION SERVER APPARATUS, SECURE COMPUTATION METHOD, AND SECURE COMPUTATION PROGRAM | May 2023 | February 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18310506 | BLOCKCHAIN SYSTEMS AND METHODS FOR USER AUTHENTICATION | May 2023 | April 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18125420 | SYSTEM FOR ELECTRONIC DATA OBFUSCATION AND PROTECTION USING INDEPENDENT DESTRUCTIBLE DATA OBJECTS | March 2023 | August 2024 | Allow | 17 | 0 | 0 | Yes | No |
| 18165667 | AUTHENTICATION OF DEVICE IN NETWORK USING CRYPTOGRAPHIC CERTIFICATE | February 2023 | June 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18153137 | DYNAMIC AND MODULAR DATA CLASSIFICATION ENGINE | January 2023 | September 2024 | Allow | 20 | 0 | 1 | Yes | No |
| 18015264 | SLICE-SPECIFIC SECURITY REQUIREMENT INFORMATION | January 2023 | June 2025 | Allow | 30 | 2 | 1 | Yes | No |
| 18089524 | Multi-Project Chip, Methods of Making, and Using the Same | December 2022 | June 2025 | Abandon | 30 | 1 | 1 | No | No |
| 18086626 | REVERSE WEBHOOK AUTHENTICATION | December 2022 | January 2025 | Allow | 25 | 0 | 0 | No | No |
| 18082837 | MASKING OF KEY GENERATION OPERATIONS WITH RANDOM MATRICES IN CRYPTOGRAPHIC APPLICATIONS | December 2022 | September 2024 | Allow | 21 | 0 | 0 | No | No |
| 18082052 | Methods, Systems and Computer Program Products for Generation and Transfer of Non-Fungible Tokens | December 2022 | May 2025 | Allow | 29 | 1 | 0 | No | No |
| 18062535 | SYSTEMS AND METHODS FOR MANAGING KEYS OF DIGITAL CERTIFICATES | December 2022 | September 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 18076317 | WAN OPTIMIZATION FOR ENCRYPTED DATA TRAFFIC USING FULLY HOMOMORPHIC ENCRYPTION | December 2022 | September 2024 | Allow | 22 | 0 | 0 | No | No |
| 18070666 | SECURE PASSWORD GENERATION AND MANAGEMENT USING NFC AND CONTACTLESS SMART CARDS | November 2022 | April 2025 | Allow | 28 | 2 | 0 | Yes | No |
| 17993824 | MONITORING CODE PROVENANCE | November 2022 | January 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 17992808 | CROSS-CHAIN DATA TRANSMISSION METHOD AND APPARATUS, COMPUTER DEVICE, STORAGE MEDIUM, AND COMPUTER PROGRAM PRODUCT | November 2022 | September 2024 | Allow | 22 | 0 | 0 | No | No |
| 17991026 | Security Analytics System for Performing an Interaction Classification Operation | November 2022 | May 2025 | Allow | 40 | 2 | 0 | Yes | No |
| 18056489 | TRANSIENT OBJECT REFERENCES | November 2022 | December 2023 | Allow | 13 | 2 | 0 | No | No |
| 18052286 | ENABLING PERSISTENCE IN A VOLATILE SECURE WORKSPACE | November 2022 | January 2025 | Allow | 27 | 1 | 1 | No | No |
| 18052267 | LABEL RECOMMENDATION FOR CYBERSECURITY CONTENT | November 2022 | February 2025 | Allow | 27 | 1 | 1 | Yes | No |
| 18052240 | System and Method for Evaluating Penetration Testing Tools | November 2022 | April 2025 | Allow | 29 | 2 | 0 | Yes | No |
| 17973022 | Integrations Platform with Interaction and Abstraction with a Third Party Platform | October 2022 | October 2024 | Allow | 33 | 0 | 1 | No | No |
| 17971010 | Secure Browsing Via A Transparent Network Proxy | October 2022 | February 2025 | Allow | 28 | 2 | 0 | Yes | No |
| 18046341 | Ransomware-Aware Solid-State Drive | October 2022 | May 2024 | Allow | 20 | 0 | 0 | Yes | No |
| 17916943 | USER CENTRIC SYSTEM AND METHOD FOR INTERACTION BETWEEN HUMANS AND DEVICES | October 2022 | February 2025 | Abandon | 29 | 0 | 1 | No | No |
| 17957037 | SYSTEM AND METHOD OF IMAGED BASED LOGIN TO AN ACCESS DEVICE | September 2022 | February 2025 | Allow | 28 | 2 | 0 | Yes | No |
| 17945690 | Distributed Digital Rights Management (DRM) Protection | September 2022 | March 2025 | Allow | 30 | 2 | 0 | Yes | No |
| 17932060 | SYSTEM AND METHOD FOR CENTRALIZED CYBERSECURITY CONFIGURATION COMPLIANCE MANAGEMENT | September 2022 | October 2024 | Allow | 25 | 1 | 0 | No | No |
| 17900353 | Session Similarity Identification | August 2022 | March 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 17899427 | Penetration Testing in Zero Trust Network Environment | August 2022 | June 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17898287 | Security Risk Evaluation Across User Devices | August 2022 | January 2025 | Allow | 29 | 2 | 0 | Yes | No |
| 17799557 | ONLINE SECRET ENCRYPTION | August 2022 | October 2024 | Allow | 26 | 1 | 1 | Yes | No |
| 17884048 | SYSTEM AND METHOD FOR ANONYMIZING A PERSON CAPTURED IN AN IMAGE | August 2022 | May 2024 | Allow | 21 | 0 | 0 | No | No |
| 17814492 | SECURE COMMUNICATION SYSTEM | July 2022 | October 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17868227 | HOME DATA MANAGEMENT | July 2022 | June 2024 | Allow | 23 | 0 | 0 | Yes | No |
| 17863699 | SYSTEM AND METHOD EMPLOYING REDUCED TIME DEVICE PROCESSING | July 2022 | August 2024 | Allow | 25 | 1 | 0 | Yes | No |
| 17843605 | Meeting Join for Meeting Device | June 2022 | April 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17843340 | PRIVATE NETWORK REQUEST FORWARDING | June 2022 | April 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17746493 | PRIVATE NETWORK REQUEST FORWARDING | May 2022 | April 2024 | Allow | 23 | 0 | 0 | Yes | No |
| 17776573 | MULTIFACTOR AUTHENTICATION USING BLOCKCHAIN TRANSACTIONS | May 2022 | November 2024 | Allow | 30 | 2 | 0 | Yes | No |
| 17733133 | COMPROMISE FREE CLOUD DATA ENCRYPTION AND SECURITY | April 2022 | December 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17718572 | INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM | April 2022 | March 2024 | Allow | 23 | 1 | 0 | Yes | No |
| 17658056 | SECURE COMMUNICATION SYSTEM | April 2022 | April 2025 | Allow | 37 | 2 | 1 | Yes | No |
| 17694540 | Data Access Gateway for Security and Privacy | March 2022 | February 2023 | Allow | 11 | 2 | 0 | No | No |
| 17680977 | CODE MODIFICATION FOR DETECTING ABNORMAL ACTIVITY | February 2022 | March 2024 | Allow | 25 | 0 | 0 | Yes | No |
| 17646779 | SECURE AUTHENTICATION FOR ACCESSING REMOTE RESOURCES | January 2022 | March 2024 | Allow | 26 | 0 | 0 | Yes | No |
| 17644894 | Matrix Encryption - A Symmetric Key Encryption Technology | December 2021 | May 2023 | Allow | 17 | 0 | 0 | Yes | No |
| 17643781 | SYMMETRIC CROSS-REGION NETWORK DATA FLOW MANAGEMENT | December 2021 | January 2024 | Allow | 25 | 0 | 1 | Yes | No |
| 17516529 | AUTOMATED PREEMPTIVE POLYMORPHIC DECEPTION | November 2021 | June 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17503818 | SYSTEMS AND METHODS FOR FILTERING NETWORK COMMUNICATIONS WITH A DEMILITARIZED ZONE | October 2021 | September 2024 | Abandon | 35 | 2 | 0 | Yes | No |
| 17487931 | RULE SET-BASED AUTHORIZATION FOR DATA POOL | September 2021 | February 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17484971 | SYSTEMS, DEVICES AND METHODS FOR PROTECTING AND EXCHANGING ELECTRONIC COMPUTER FILES | September 2021 | November 2023 | Allow | 26 | 0 | 0 | Yes | No |
| 17428809 | END-TO-END DOUBLE-RATCHET ENCRYPTION WITH EPOCH KEY EXCHANGE | August 2021 | July 2023 | Allow | 23 | 0 | 0 | Yes | No |
| 17381584 | COMMAND AUTHORITY EXTENSION SYSTEM AND METHOD FOR SECURITY PROTOCOL AND DATA MODEL (SPDM) SECURE COMMUNICATION CHANNELS | July 2021 | June 2023 | Allow | 23 | 0 | 0 | Yes | No |
| 17373686 | TRUSTED INDICATORS TO SECURE VISUAL OUTPUTS | July 2021 | March 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17357465 | SCREEN SHARING SESSION PRIVACY MANAGER | June 2021 | March 2024 | Allow | 33 | 2 | 0 | Yes | No |
| 17356922 | METHOD FOR SECURELY UPDATING CONTROL UNITS | June 2021 | April 2023 | Allow | 22 | 1 | 0 | Yes | No |
| 17348975 | DATA PROCESSING METHODS, APPARATUSES, AND DEVICES | June 2021 | May 2022 | Allow | 11 | 2 | 0 | Yes | No |
| 17332184 | SYSTEM AND METHOD FOR BINDING APPLICATIONS TO A ROOT OF TRUST | May 2021 | February 2023 | Allow | 21 | 0 | 0 | Yes | No |
| 17331709 | ADAPTIVE OFFLINE POLICY ENFORCEMENT BASED ON CONTEXT | May 2021 | March 2023 | Allow | 22 | 0 | 0 | Yes | No |
| 17328466 | SYSTEMS AND METHODS FOR EXTENDING BOOT SECURITY TRUST CHAINING TO STATE CHANGES BETWEEN BOOT SESSIONS | May 2021 | February 2023 | Allow | 21 | 0 | 0 | Yes | No |
| 17328739 | Dual Level Management | May 2021 | August 2022 | Allow | 15 | 0 | 1 | Yes | No |
| 17323430 | LICENSE-PROTECTED BOOT DEVICE | May 2021 | May 2023 | Allow | 24 | 2 | 0 | Yes | No |
| 17245233 | DATABASE SECURITY | April 2021 | January 2023 | Allow | 21 | 2 | 0 | Yes | No |
| 17242339 | ACCESS CONTROL MANAGEMENT OF BASEBOARD MANAGEMENT CONTROLLER PERIPHERALS | April 2021 | June 2022 | Allow | 13 | 0 | 0 | No | No |
| 17230197 | EFFICIENT HARDWARE ARCHITECTURE FOR HIGHLY SECURE ISOGENY-BASED CRYPTOSYSTEMS | April 2021 | August 2021 | Allow | 4 | 1 | 0 | Yes | No |
| 17228507 | IDENTITY MANAGEMENT PROTOCOL ROUTER | April 2021 | November 2024 | Allow | 43 | 4 | 0 | Yes | No |
| 17219392 | FUSE BASED REPLAY PROTECTION WITH CONSERVATIVE FUSE USAGE | March 2021 | November 2022 | Allow | 20 | 0 | 1 | Yes | No |
| 17211947 | INFORMATION SECURITY SYSTEM AND METHOD FOR ANOMALY DETECTION IN DATA TRANSMISSION | March 2021 | April 2022 | Allow | 13 | 0 | 0 | Yes | No |
| 17212050 | INFORMATION SECURITY SYSTEM AND METHOD FOR INCOMPLIANCE DETECTION IN DATA TRANSMISSION | March 2021 | April 2022 | Allow | 13 | 0 | 0 | Yes | No |
| 17211916 | INFORMATION SECURITY SYSTEM AND METHOD FOR SECURITY THREAT DETECTION IN DATA TRANSMISSION | March 2021 | April 2022 | Allow | 13 | 0 | 0 | Yes | No |
| 17205560 | SECURITY SYSTEM AND METHOD FOR SOFTWARE TO BE INPUT TO A CLOSED INTERNAL NETWORK | March 2021 | April 2022 | Allow | 13 | 0 | 0 | Yes | No |
| 17195194 | BLOCKCHAIN SYSTEMS AND METHODS FOR USER AUTHENTICATION | March 2021 | January 2023 | Allow | 23 | 0 | 0 | Yes | No |
| 17190760 | SYSTEM FOR ELECTRONIC DATA OBFUSCATION AND PROTECTION USING INDEPENDENT DESTRUCTIBLE DATA OBJECTS | March 2021 | March 2023 | Allow | 24 | 1 | 0 | No | No |
| 17181123 | Processor and Memory System to Selectively Enable Communication | February 2021 | February 2023 | Allow | 24 | 3 | 0 | Yes | No |
| 17178228 | MONITORING CODE PROVENANCE | February 2021 | September 2022 | Allow | 18 | 1 | 0 | Yes | No |
| 17178225 | DOCUMENTING AND ANNOTATING CODE ACTIVITIES | February 2021 | October 2022 | Allow | 20 | 1 | 0 | Yes | No |
| 17150150 | METHODS AND APPARATUS FOR DYNAMIC DATA ACCESS PROVISIONING | January 2021 | February 2023 | Allow | 25 | 2 | 0 | Yes | No |
| 17255921 | SECURE-AWARE BUS SYSTEM | December 2020 | February 2022 | Allow | 14 | 0 | 0 | Yes | No |
| 17125327 | IMEI STORAGE | December 2020 | September 2023 | Allow | 33 | 2 | 0 | Yes | No |
| 17115688 | SYSTEM AND METHOD FOR USING A DISTRIBUTED LEDGER GATEWAY | December 2020 | August 2022 | Allow | 21 | 0 | 0 | Yes | No |
| 17114072 | SYSTEM AND METHOD FOR STORING, DELIVERING AND SCREENING VISUAL MEDIA | December 2020 | November 2024 | Abandon | 47 | 4 | 0 | No | No |
| 17056388 | MULTI-MASTER SECURITY CIRCUIT | November 2020 | March 2023 | Allow | 28 | 2 | 0 | Yes | No |
| 17096007 | Secure Browsing Via A Transparent Network Proxy | November 2020 | July 2022 | Allow | 20 | 0 | 0 | Yes | No |
| 17091944 | SECURE COMMUNICATION SYSTEM | November 2020 | August 2023 | Allow | 33 | 2 | 1 | Yes | No |
| 17063485 | CLOUD KEY MANAGEMENT FOR AFU SECURITY | October 2020 | June 2022 | Allow | 21 | 0 | 0 | No | No |
| 17027556 | Methods And Systems For Securing And Retrieving Sensitive Data Using Indexable Databases | September 2020 | December 2022 | Allow | 26 | 1 | 0 | Yes | No |
| 17025848 | Security Risk Evaluation Across User Devices | September 2020 | April 2022 | Allow | 19 | 0 | 0 | Yes | No |
| 17022938 | PUBLISH-SUBSCRIBE BROKER NETWORK OVERLAY SYSTEM | September 2020 | February 2023 | Allow | 29 | 1 | 1 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner BECHTEL, KEVIN M.
With a 6.2% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 3.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner BECHTEL, KEVIN M works in Art Unit 2491 and has examined 507 patent applications in our dataset. With an allowance rate of 76.7%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 28 months.
Examiner BECHTEL, KEVIN M's allowance rate of 76.7% places them in the 35% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by BECHTEL, KEVIN M receive 1.81 office actions before reaching final disposition. This places the examiner in the 55% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by BECHTEL, KEVIN M is 28 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +58.0% benefit to allowance rate for applications examined by BECHTEL, KEVIN M. This interview benefit is in the 97% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 32.5% of applications are subsequently allowed. This success rate is in the 62% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 7.1% of cases where such amendments are filed. This entry rate is in the 3% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 44.4% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 38% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 42.9% of appeals filed. This is in the 6% percentile among all examiners. Of these withdrawals, 75.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.
When applicants file petitions regarding this examiner's actions, 22.3% are granted (fully or in part). This grant rate is in the 13% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.2% of allowed cases (in the 50% percentile). This examiner makes examiner's amendments less often than average. You may need to make most claim amendments yourself.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 2.1% of allowed cases (in the 66% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.