USPTO Examiner CAREY FORREST L - Art Unit 2491

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
17135003Digitally Signing Documents Using Digital SignaturesDecember 2020August 2022Allow2010YesNo
17120952CRYPTOGRAPHIC PROCESSING METHOD, ASSOCIATED ELECTRONIC DEVICE AND COMPUTER PROGRAMDecember 2020October 2024Abandon4640YesNo
17117265ENHANCED BEACON PROTECTION REKEYING AND ATTACK DETECTION FOR WIRELESS COMMUNICATIONSDecember 2020June 2024Abandon4220NoNo
17114308DETECTING AND PREVENTING CIPHER KEY DISCLOSUREDecember 2020August 2022Allow2010YesNo
16953151FIRMWARE RUNTIME PATCH SECURE RELEASE PROCESSNovember 2020July 2024Abandon4441YesNo
16951993DETECTING AND PREVENTING UNAUTHORIZED COMMAND INJECTIONNovember 2020March 2023Allow2720YesNo
17054597BIOS ACCESSNovember 2020June 2023Allow3121YesNo
17081594METHOD AND APPARATUS FOR DETECTING VULNERABILITY OF MULTI-LANGUAGE PROGRAMOctober 2020February 2024Abandon4040NoNo
17048339VULNERABILITY STATE REPORTOctober 2020November 2022Abandon2520YesNo
16980974APPARATUS, SYSTEM AND METHOD FOR ASSOCIATING A DEVICE TO A USER OF A SERVICESeptember 2020September 2023Allow3640YesNo
17008896SYSTEMS AND METHODS FOR AUTOMATED ATTACK PLANNING, ANALYSIS, AND EVALUATIONSeptember 2020July 2023Abandon3520NoNo
17005685METHOD AND APPARATUS FOR DETECTING AND REMEDIATING SECURITY VULNERABILITIES IN COMPUTER READABLE CODEAugust 2020May 2023Abandon3320YesNo
16937952BLIND KEY GENERATOR AND EXCHANGEJuly 2020April 2023Abandon3310NoNo
16936981METHOD AND SYSTEM FOR DOS DETECTION, MITIGATION AND NOTIFICATIONJuly 2020March 2022Allow1900YesNo
16928969GLOBAL NAVIGATION SATELLITE SYSTEM INTERFERENCE ATTACK DETECTIONJuly 2020July 2023Allow3630YesNo
16923437SECURITY INFRASTRUCTURE AS A SERVICEJuly 2020May 2022Abandon2210NoNo
16917494VULNERABILITY INFERENCE FOR IDENTIFYING VULNERABLE PROCESSESJune 2020May 2023Allow3530NoNo
16957598Security Mechanism for Interworking with Independent SEAF in 5G NetworksJune 2020August 2023Allow3820NoNo
16955542DATA PRODUCT RELEASE METHOD OR SYSTEMJune 2020June 2024Allow4840YesNo
16902071DYNAMICALLY ENCRYPTED RADIO FREQUENCY FINGERPRINTINGJune 2020July 2024Allow4930YesNo
16887602POWER SIDE-CHANNEL ATTACK VULNERABILITY ASSESSMENT SYSTEMS AND METHODSMay 2020March 2023Abandon3420YesNo
16880819POLICY BASED ACCESS CONTROL OF SUBSYSTEM ASSETS VIA EXTERNAL DEBUG INTERFACEMay 2020September 2022Abandon2810NoNo
16763936VEHICLE ENTERPRISE FLEET MANAGEMENT SYSTEM AND METHODMay 2020December 2023Abandon4320NoNo
16870895SYSTEMS AND METHODS FOR IDENTIFYING SOFTWARE VULNERABILITIES IN EMBEDDED DEVICE FIRMWAREMay 2020February 2023Abandon3420YesNo
16865959REDUCING AUTHENTICATION STEPS DURING WI-FI AND 5G HANDOVERMay 2020February 2023Allow3420YesNo
16754846REGULATING ACCESSApril 2020November 2022Abandon3120YesNo
16828908TEST SCENARIO GENERATION DEVICE, TEST SCENARIO GENERATION METHOD AND TEST SCENARIO GENERATION PROGRAMMarch 2020December 2022Abandon3310NoNo
16801173GENETIC FUZZING FOR CUSTOMIZATION OF SECURITY OPERATIONS CENTER RULES PER ORGANIZATIONFebruary 2020March 2023Allow3720YesNo
16794730Secure RangingFebruary 2020August 2023Allow4120YesNo
16745334SHARING ENCRYPTED ITEMS WITH PARTICIPANTS VERIFICATIONJanuary 2020April 2022Allow2730YesNo
16727983ELECTRONIC CIRCUITS FOR SECURE COMMUNICATIONS AND ASSOCIATED SYSTEMS AND METHODSDecember 2019November 2021Abandon2210NoNo
16724281ANALYTICS INTERFACE WITH PRIVACY MANAGEMENTDecember 2019April 2022Allow2710YesNo
16596467SYSTEM AND METHOD FOR IDENTITY VERIFICATION ACROSS MOBILE APPLICATIONSOctober 2019October 2021Allow2400YesNo
16572995SECURE CONFIRMATION EXCHANGE FOR OFFLINE INDUSTRIAL MACHINESeptember 2019October 2021Allow2500YesNo
16555035Securing Data In A Dispersed Storage NetworkAugust 2019June 2021Allow2200YesNo
16452317Indication Of Additional Security Capabilities Using NAS Signaling In 5G Mobile CommunicationsJune 2019June 2022Allow3610YesNo
16287308IDENTITY PRIVACY IN WIRELESS NETWORKSFebruary 2019September 2022Allow4220YesNo
16260315INTRA-CARRIER AND INTER-CARRIER NETWORK SECURITY SYSTEMJanuary 2019September 2019Allow700YesNo
15991274DYNAMIC BYPASS OF TLS CONNECTIONS MATCHING EXCLUSION LIST IN DPI-SSL IN A NAT DEPLOYMENTMay 2018April 2021Abandon3520YesYes
15970711INFORMATION PROCESSING APPARATUS, STORAGE MEDIUM, AND CONTROL METHOD THEREFORMay 2018April 2022Abandon4840NoNo
15968335SYSTEMS AND METHODS FOR USER SPECIFIC DATA TRANSMISSION WITH IMPROVED DATA PROTECTIONMay 2018December 2021Abandon4330YesNo
15965486Anti-Attack Data Transmission Method and DeviceApril 2018November 2021Allow4340YesNo
15944456LOCATION-BASED SECURITY OF STORAGE DRIVESApril 2018February 2023Abandon5940NoNo
15944022AUTHENTICATION METHOD AND AUTHENTICATION SYSTEMApril 2018June 2022Abandon5010NoNo
15943217ANNOUNCEMENT SMART CONTRACTS TO ANNOUNCE SOFTWARE RELEASEApril 2018May 2022Abandon4910NoNo
15943571DATA PROTECTION METHODApril 2018March 2022Abandon4810YesNo
15942129MALWARE DETECTION IN APPLICATIONS BASED ON PRESENCE OF COMPUTER GENERATED STRINGSMarch 2018March 2023Abandon6030NoNo
15941992TECHNIQUES TO PROVIDE HARDWARE ENFORCED PROTECTION ENVIRONMENT FOR A SYSTEM MANAGEMENT MODEMarch 2018May 2023Allow6040YesNo
15942096DISPLAY OF PROTECTED CONTENT USING TRUSTED EXECUTION ENVIRONMENTMarch 2018August 2022Allow5220YesNo
15941219USER VERIFICATION OF MALWARE IMPACTED FILESMarch 2018December 2021Allow4530NoNo
15940797EMBEDDED UNIVERSAL INTEGRATED CIRCUIT CARD (eUICC) PROFILE CONTENT MANAGEMENTMarch 2018August 2022Allow5221NoNo
15938015SYSTEMS, METHODS, AND APPARATUS FOR DETECTING CONTROL FLOW ATTACKSMarch 2018December 2020Allow3300YesNo
15938857APPARATUS, SYSTEM, AND METHOD FOR EFFICIENTLY FILTERING PACKETS AT NETWORK DEVICESMarch 2018March 2022Allow4830YesNo
15937226Information Processing Device that Processes Information Using Private Key and Public KeyMarch 2018November 2021Allow4420YesNo
15933548APPARATUS AND METHOD FOR GENERATING KEY, AND APPARATUS AND METHOD FOR ENCRYPTIONMarch 2018December 2023Abandon6051YesNo
15934489TRUSTED CYBER PHYSICAL SYSTEMMarch 2018February 2022Allow4621YesNo
15928265IAAS-AIDED ACCESS CONTROL FOR INFORMATION CENTRIC NETWORKING WITH INTERNET-OF-THINGSMarch 2018February 2021Allow3510YesNo
15926800METHOD AND APPARATUS FOR SIGNING AND VERIFYING APPLICATION INSTALLATION PACKAGE, AND STORAGE MEDIUMMarch 2018August 2022Abandon5340YesNo
15925144INFORMATION REGISTRATION AND AUTHENTICATION METHOD AND DEVICEMarch 2018August 2021Allow4130YesNo
15913035CONFIDENCE LEVELS IN REPUTABLE ENTITIESMarch 2018January 2021Abandon3420NoNo
15903801IDENTITY AUTHENTICATION USING BIOMETRICSFebruary 2018January 2022Allow4720YesNo
15870004SYSTEM AND METHOD FOR DETECTING AND PREVENTING NETWORK INTRUSION OF MALICIOUS DATA FLOWSJanuary 2018March 2022Allow5030NoNo
15853556SECURE TIME SERVICEDecember 2017December 2021Allow4830YesNo
15852327DATA PROCESSING MEANS AND METHOD FOR OPERATING THE SAMEDecember 2017June 2021Allow4220YesNo
15850788DEVICE DISPLAY SECURITY WITH USER-SPECIFIED FILTERING OF DISPLAY CONTENTSDecember 2017April 2020Allow2740YesNo
15847409BLIND KEY GENERATOR AND EXCHANGEDecember 2017January 2021Abandon3710NoNo
15783244METHOD AND APPARATUS FOR PROVIDING SECURE COMMUNICATION IN A SELF-ORGANIZING NETWORKOctober 2017May 2021Allow4320YesNo
15701229CRYPTOGRAPHIC KEY EXCHANGE OVER AN ELECTROSTATIC CHANNELSeptember 2017March 2018Allow600YesNo
15676533SYSTEMS AND METHODS FOR SECURE COLLABORATION WITH PRECISION ACCESS MANAGEMENTAugust 2017March 2020Abandon3210NoNo
15674411DATA INTERWORKING METHOD AND DATA INTERWORKING DEVICEAugust 2017May 2022Abandon5740YesNo
15670585ELECTRONIC DEVICEAugust 2017August 2022Abandon6040YesNo
15525260AUTHENTICATION METHOD, AUTHENTICATION SYSTEM AND AUTHENTICATION DEVICES FOR AUTHENTICATING AN OBJECTJuly 2017July 2019Abandon2610NoNo
15542561Subscriber Identification Module and Application Executable on a Subscriber Identification ModuleJuly 2017January 2025Abandon6080YesYes
15540311METHOD AND APPARATUS PROVIDING SECURITY USING GRAPHIC ELEMENTSJune 2017September 2019Abandon2720NoNo
15587694Social Campaign Network and Method for Dynamic Content Delivery In SameMay 2017January 2021Abandon4420NoNo
15477063Systems and Methods for Uploading Streamed Objects to a Cloud Storage SystemApril 2017September 2022Allow6050YesNo
15454451METHOD AND SYSTEM FOR SECURITY AND AUTHENTICATION OF AIRCRAFT DATA TRANSMISSIONSMarch 2017March 2021Allow4830YesNo
15438251APPLICATION SECURITY PROTECTION METHOD, TERMINAL, AND STORAGE MEDIUMFebruary 2017May 2021Allow5140YesNo
15426525DEVICE DISPLAY SECURITY WITH USER-SPECIFIED FILTERING OF DISPLAY CONTENTSFebruary 2017March 2020Allow3840YesNo
15407181Digitally Signing Documents Using Digital SignaturesJanuary 2017August 2020Allow4320YesNo
15403639METHOD AND APPARATUS FOR CONTROLLING A DEVICE USING BLUETOOTH TECHNOLOGYJanuary 2017March 2020Allow3820NoNo
15382806Efficient Packet Capture for Cyber Threat AnalysisDecember 2016March 2023Allow6080YesNo
15362938High Latency Channel and Low Latency ChannelNovember 2016November 2019Allow3520YesYes
15335562DETECTING AN ATTEMPTED THEFT OF INFORMATION STORED IN AN RFID-ENABLED CARDOctober 2016May 2020Allow4350YesNo
15286505METHOD OF USING ONE DEVICE TO UNLOCK ANOTHER DEVICEOctober 2016December 2021Allow6040YesNo
15285313Techniques for Detecting EncryptionOctober 2016January 2020Allow4021YesNo
15254088HYBRID HYPERVISOR-ASSISTED SECURITY MODELSeptember 2016December 2019Allow3930YesNo
15225280METHOD AND SYSTEM TO MANAGE ACCESS TO A WIRELESS LOCAL AREA NETWORKAugust 2016February 2021Allow5540YesNo
15223962ENCRYPTION OF APPLICATION DATA USING FIELD-LEVEL METADATAJuly 2016February 2022Allow6050YesNo
15200682Mutable Fields in Digital CertificatesJuly 2016August 2019Allow3710YesNo
15201180SENSITIVE DATA SERVICE STORAGEJuly 2016March 2022Abandon6060YesNo
15192360METHODS AND APPARATUS FOR DETECTING SUSPICIOUS NETWORK ACTIVITYJune 2016May 2019Allow3520YesYes
15185380Data Anonymization for Distributed Hierarchical NetworksJune 2016May 2020Allow4720YesNo
15177070METHOD AND APPARATUS FOR DETECTING UNAUTHORIZED USE OF A MOBILE DEVICEJune 2016January 2021Abandon5540YesNo
15171099SYSTEM, METHOD, AND RECORDING MEDIUM FOR MOVING TARGET DEFENSEJune 2016July 2020Allow4950YesNo
15144080SECURELY STORING DATA IN A DISPERSED STORAGE NETWORKMay 2016July 2019Allow3930YesYes
15095177Identifying security breaches from clustering propertiesApril 2016June 2020Abandon5040YesNo
15016447ELECTRONIC DEVICE AND DATA TRANSMISSION METHOD THEREOFFebruary 2016November 2020Abandon5831NoNo
15015901NETWORK CAPABLE OF DETECTING DoS ATTACKS AND METHOD OF CONTROLLING THE SAME, GATEWAY AND MANAGING SERVER INCLUDED IN THE NETWORKFebruary 2016September 2019Abandon6020NoNo
15015441ELECTRONIC CIRCUITS FOR SECURE COMMUNICATIONS AND ASSOCIATED SYSTEMS AND METHODSFebruary 2016November 2019Allow4530YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner CAREY, FORREST L.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
7
Examiner Affirmed
7
(100.0%)
Examiner Reversed
0
(0.0%)
Reversal Percentile
7.2%
Lower than average

What This Means

With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
18
Allowed After Appeal Filing
3
(16.7%)
Not Allowed After Appeal Filing
15
(83.3%)
Filing Benefit Percentile
20.9%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 16.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner CAREY, FORREST L - Prosecution Strategy Guide

Executive Summary

Examiner CAREY, FORREST L works in Art Unit 2491 and has examined 217 patent applications in our dataset. With an allowance rate of 52.1%, this examiner allows applications at a lower rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 43 months.

Allowance Patterns

Examiner CAREY, FORREST L's allowance rate of 52.1% places them in the 15% percentile among all USPTO examiners. This examiner is less likely to allow applications than most examiners at the USPTO.

Office Action Patterns

On average, applications examined by CAREY, FORREST L receive 3.12 office actions before reaching final disposition. This places the examiner in the 86% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by CAREY, FORREST L is 43 months. This places the examiner in the 17% percentile for prosecution speed. Applications take longer to reach final disposition with this examiner compared to most others.

Interview Effectiveness

Conducting an examiner interview provides a +55.1% benefit to allowance rate for applications examined by CAREY, FORREST L. This interview benefit is in the 94% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 19.3% of applications are subsequently allowed. This success rate is in the 22% percentile among all examiners. Strategic Insight: RCEs show lower effectiveness with this examiner compared to others. Consider whether a continuation application might be more strategic, especially if you need to add new matter or significantly broaden claims.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 8.2% of cases where such amendments are filed. This entry rate is in the 9% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 60.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 51% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 63.2% of appeals filed. This is in the 42% percentile among all examiners. Of these withdrawals, 41.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 77.8% are granted (fully or in part). This grant rate is in the 82% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 23% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Prepare for rigorous examination: With a below-average allowance rate, ensure your application has strong written description and enablement support. Consider filing a continuation if you need to add new matter.
  • Expect multiple rounds of prosecution: This examiner issues more office actions than average. Address potential issues proactively in your initial response and consider requesting an interview early in prosecution.
  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.
  • Plan for extended prosecution: Applications take longer than average with this examiner. Factor this into your continuation strategy and client communications.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.