Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18405738 | Secure Multi-Party Reach and Frequency Estimation | January 2024 | May 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18527691 | Subscription Concealed Identifier (SUCI) Supporting Post-Quantum Cryptography | December 2023 | August 2025 | Allow | 20 | 1 | 0 | No | No |
| 18554888 | GENERATION OF SIGNING KEYS | October 2023 | February 2026 | Abandon | 28 | 1 | 0 | Yes | No |
| 18481263 | SECURE AGGREGATION WITH INTEGRITY VERIFICATION | October 2023 | March 2026 | Allow | 29 | 2 | 0 | No | No |
| 18234474 | System, Method, and Computer Program Product for Validating Software Agents in Robotic Process Automation Systems | August 2023 | December 2024 | Allow | 16 | 1 | 0 | Yes | No |
| 18192287 | KEY MANAGEMENT FOR MULTI-PARTY COMPUTATION | March 2023 | August 2025 | Allow | 28 | 2 | 0 | Yes | No |
| 18179089 | SECURE ACCESS VIA 802.1X PORT-BASED NETWORK ACCESS CONTROL (PNAC) | March 2023 | June 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18042878 | MEDIA AUTHENTICATION | February 2023 | February 2026 | Allow | 36 | 3 | 0 | Yes | Yes |
| 18172804 | METHOD TO OPTIMIZE CREATION OF RESTORE POINTS FOR EFFECTIVE USE OF DISK SPACE | February 2023 | December 2025 | Abandon | 34 | 2 | 0 | Yes | No |
| 17928619 | SYSTEM AND METHOD FOR QUANTUM KEY DISTRIBUTION WITH ENTANGLED PHOTON PAIRS | November 2022 | February 2025 | Allow | 27 | 1 | 0 | No | No |
| 17994753 | SYSTEMS AND METHODS FOR CREATING DERIVATIVE DIGITAL ASSETS BY BRANCHING ON AN ORIGINAL NON-FUNGIBLE TOKEN | November 2022 | October 2025 | Allow | 34 | 2 | 0 | No | No |
| 17957337 | INTERNET OF THINGS (IOT) DEVICE IDENTIFICATION USING TRAFFIC PATTERNS | September 2022 | February 2025 | Abandon | 29 | 3 | 0 | No | No |
| 17890680 | CLOUD SERVER AND OPERATION METHOD THEREOF | August 2022 | December 2024 | Allow | 28 | 1 | 0 | No | No |
| 17839713 | FACE AUTHENTICATION SYSTEM | June 2022 | January 2026 | Abandon | 43 | 4 | 0 | No | No |
| 17738564 | SYSTEMS AND METHODS FOR ACCOUNT SESSION MANAGEMENT | May 2022 | March 2026 | Allow | 46 | 4 | 0 | No | No |
| 17728102 | METHOD AND SYSTEM FOR LICENSING AND DELIVERING KEYS FOR SENSORS AND RECEIVERS | April 2022 | October 2024 | Allow | 30 | 1 | 0 | No | No |
| 17679893 | Adversarial Machine Learning Attack Detection and Prevention System | February 2022 | February 2026 | Allow | 48 | 3 | 0 | Yes | No |
| 17645634 | TRANSLATE RANDOM UNIQUE METHOD FOR PASSCODE ENCRYPTION TECHNOLOGY | December 2021 | January 2025 | Allow | 37 | 2 | 0 | Yes | No |
| 17619227 | SYSTEMS AND METHODS FOR USER VERIFICATION BASED ON ACTIGRAPHY DATA | December 2021 | August 2024 | Abandon | 32 | 1 | 0 | No | No |
| 17546413 | SECOND FACTOR AUTHENTICATION FOR IOT DEVICES | December 2021 | June 2025 | Abandon | 42 | 4 | 0 | No | No |
| 17546196 | THREAT MANAGEMENT USING NETWORK TRAFFIC TO DETERMINE SECURITY STATES | December 2021 | September 2025 | Allow | 46 | 3 | 0 | Yes | No |
| 17543513 | Distributed Registration and Authentication via Threshold Secret Sharing | December 2021 | January 2025 | Abandon | 37 | 2 | 0 | No | No |
| 17454917 | MANAGING SECRET VALUES USING A SECRETS MANAGER | November 2021 | February 2025 | Allow | 39 | 3 | 0 | Yes | No |
| 17514755 | DEVICE SPECIFIC MULTIPARTY COMPUTATION | October 2021 | February 2025 | Allow | 39 | 2 | 0 | Yes | No |
| 17490965 | POLYNOMIAL FUNCTION SECRET SHARING | September 2021 | February 2025 | Allow | 41 | 4 | 0 | Yes | No |
| 17488947 | Method, Apparatus, Computer Program and Data Carrier for Determining a Shared Secret Cryptographic Key | September 2021 | August 2024 | Allow | 34 | 2 | 0 | No | No |
| 17479231 | COMPUTING DEVICE VERIFICATION | September 2021 | July 2025 | Abandon | 46 | 2 | 0 | Yes | Yes |
| 17469106 | SECURE COMPUTING METHOD, SECURE COMPUTING SYSTEM, AND SECURE COMPUTING MANAGEMENT DEVICE | September 2021 | August 2023 | Allow | 24 | 1 | 0 | Yes | No |
| 17402293 | ENCRYPTION IN A DISTRIBUTED STORAGE SYSTEM UTILIZING CLUSTER-WIDE ENCRYPTION KEYS | August 2021 | January 2025 | Allow | 41 | 3 | 0 | Yes | Yes |
| 17399002 | INTERNAL KEY MANAGEMENT FOR A STORAGE SUBSYSTEM ENCRYPTING DATA IN THE CLOUD | August 2021 | November 2025 | Allow | 51 | 6 | 0 | Yes | No |
| 17397568 | Systems and Methods for Detecting Novel Behaviors Using Model Sharing | August 2021 | November 2024 | Abandon | 39 | 1 | 1 | No | No |
| 17393449 | DEPLOYING A SYSTEM-SPECIFIC SECRET IN A HIGHLY RESILIENT COMPUTER SYSTEM | August 2021 | August 2024 | Allow | 37 | 3 | 0 | Yes | No |
| 17366019 | METHODS AND SYSTEMS FOR HOMOMORPHIC DATA REPRESENTATION AND CONCEALMENT POWERED BY CLIFFORD GEOMETRIC ALGEBRA | July 2021 | August 2023 | Abandon | 26 | 1 | 0 | No | No |
| 17361124 | Subscription Concealed Identifier (SUCI) Supporting Post-Quantum Cryptography | June 2021 | July 2023 | Allow | 25 | 1 | 0 | No | No |
| 17360745 | MUTUAL AUTHENTICATION BETWEEN A HARDWARE TOKEN AND NON-NETWORKED DEVICE | June 2021 | February 2026 | Allow | 56 | 5 | 0 | Yes | No |
| 17348986 | MULTIPLE DEVICE COLLABORATION AUTHENTICATION | June 2021 | July 2023 | Abandon | 25 | 2 | 0 | No | No |
| 17340381 | SECURE DISTRIBUTED KEY GENERATION FOR MULTIPARTY HOMOMORPHIC ENCRYPTION | June 2021 | January 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17328723 | KEY PROTECTION USING A NOISING AND DE-NOISING SCHEME | May 2021 | July 2024 | Allow | 38 | 4 | 0 | Yes | No |
| 17325770 | APPARATUS AND METHOD FOR SECURE MERGING OF LISTS USING ONLY LOCAL COMPUTATIONS AT EACH OF TWO MACHINES AND COMMUNICATIONS SOLELY BETWEEN THE TWO MACHINES | May 2021 | November 2024 | Allow | 41 | 3 | 0 | No | No |
| 17323299 | METHODS AND SYSTEMS FOR SECURE NETWORK COMMUNICATION | May 2021 | August 2025 | Allow | 51 | 6 | 0 | No | No |
| 17244338 | SYSTEMS AND METHODS FOR SMART NETWORK INTERFACE CARD-INITIATED SERVER MANAGEMENT | April 2021 | December 2024 | Allow | 44 | 4 | 0 | No | No |
| 17281245 | SECRET SIGMOID FUNCTION CALCULATION SYSTEM, SECRET LOGISTIC REGRESSION CALCULATION SYSTEM, SECRET SIGMOID FUNCTION CALCULATION APPARATUS, SECRET LOGISTIC REGRESSION CALCULATION APPARATUS, SECRET SIGMOID FUNCTION CALCULATION METHOD, SECRET LOGISTIC REGRESSION CALCULATION METHOD, AND PROGRAM | March 2021 | April 2024 | Allow | 37 | 3 | 0 | Yes | No |
| 17216587 | PROTECTING SECRET SOFTWARE AND CONFIDENTIAL DATA IN A SECURE ENCLAVE | March 2021 | December 2022 | Abandon | 20 | 1 | 0 | No | No |
| 17214832 | REDUCTION OF TIME-DOMAIN CORRELATION FOR 11AZ SECURE SOUNDING SIGNAL | March 2021 | January 2025 | Abandon | 45 | 2 | 0 | No | No |
| 17276620 | KEY MANAGEMENT FOR MULTI-PARTY COMPUTATION | March 2021 | January 2023 | Allow | 22 | 1 | 0 | Yes | No |
| 17276643 | SECURE MULTI-PARTY REACH AND FREQUENCY ESTIMATION | March 2021 | October 2023 | Allow | 31 | 2 | 0 | Yes | No |
| 17274551 | METHOD AND APPARATUS FOR NETWORK FUNCTION MESSAGING | March 2021 | June 2024 | Allow | 39 | 5 | 0 | No | No |
| 17267813 | SECURE STRONG MAPPING COMPUTING SYSTEMS, METHODS, SECURE COMPUTING APPARATUS AND PROGRAM | February 2021 | October 2023 | Allow | 32 | 1 | 0 | Yes | No |
| 17267837 | SECURE JOINING SYSTEM, METHOD, SECURE COMPUTING APPARATUS AND PROGRAM | February 2021 | October 2023 | Allow | 32 | 1 | 0 | Yes | No |
| 17169895 | METHOD AND DEVICE FOR MATCHING EVALUATION OF STRUCTURED DATA SETS PROTECTED BY ENCRYPTION | February 2021 | April 2024 | Abandon | 38 | 3 | 0 | No | No |
| 17162378 | SYSTEM AND METHOD FOR IMPROVING THE EFFICIENCY OF ADVANCED ENCRYPTION STANDARD IN MULTI-PARTY COMPUTATION | January 2021 | August 2023 | Abandon | 31 | 2 | 0 | Yes | No |
| 17145349 | MULTI-PARTY COMPUTATION (MPC) BASED KEY SEARCH IN PRIVATE DATA | January 2021 | March 2024 | Abandon | 38 | 3 | 0 | No | No |
| 17140446 | ATTRIBUTE-BASED ENCRYPTION KEYS AS KEY MATERIAL FOR KEY-HASH MESSAGE AUTHENTICATION CODE USER AUTHENTICATION AND AUTHORIZATION | January 2021 | May 2023 | Allow | 29 | 2 | 0 | No | Yes |
| 17116483 | Privacy-Preserving Biometric Authentication | December 2020 | December 2025 | Allow | 60 | 6 | 0 | Yes | No |
| 17057120 | SECURE AGGREGATE FUNCTION COMPUTATION SYSTEM, SECURE COMPUTATION APPARATUS, SECURE AGGREGATE FUNCTION COMPUTATION METHOD, AND PROGRAM | November 2020 | November 2022 | Allow | 24 | 1 | 0 | Yes | No |
| 17097795 | ZERO-KNOWLEDGE AUTHENTICATION BASED ON DEVICE INFORMATION | November 2020 | August 2023 | Allow | 33 | 2 | 0 | No | No |
| 17047878 | One-Round Secure Multiparty Computation of Arithmetic Streams and Evaluation of Functions | October 2020 | February 2025 | Abandon | 52 | 4 | 0 | No | No |
| 17063040 | PROOF-OF-WORK BASED ON BLOCK CIPHER | October 2020 | July 2025 | Allow | 57 | 5 | 1 | Yes | No |
| 17029600 | REGISTRATION AND VERIFICATION OF BIOMETRIC MODALITIES USING ENCRYPTION TECHNIQUES IN A DEEP NEURAL NETWORK | September 2020 | January 2023 | Allow | 28 | 1 | 0 | No | No |
| 17024933 | VALIDATOR CONTROL FOR TRANSACTION BETWEEN BLOCKCHAINS | September 2020 | June 2024 | Abandon | 45 | 4 | 0 | No | No |
| 17022267 | System, Method, and Computer Program Product for Validating Software Agents in Robotic Process Automation Systems | September 2020 | May 2023 | Allow | 32 | 2 | 0 | Yes | No |
| 17020895 | PUBLIC-PRIVATE ENCRYPTION KEY GENERATION USING PCELL PARAMETER VALUES AND ON-CHIP PHYSICALLY UNCLONABLE FUNCTION VALUES | September 2020 | April 2023 | Allow | 31 | 3 | 0 | Yes | No |
| 17019764 | ENCRYPTION KEYS FROM STORAGE SYSTEMS | September 2020 | December 2024 | Allow | 51 | 4 | 0 | Yes | Yes |
| 17018983 | CRYPTOGRAPHICALLY IDENTIFYING A DEVICE | September 2020 | June 2023 | Allow | 34 | 3 | 0 | Yes | No |
| 17018559 | AUTHENTICATION INFORMATION TRANSMISSION METHOD, APPARATUS, AND STORAGE MEDIUM | September 2020 | October 2024 | Allow | 49 | 6 | 0 | Yes | No |
| 16979352 | SECURE COMPUTATION APPARATUS, SECURE COMPUTATION METHOD, PROGRAM, AND RECORDING MEDIUM | September 2020 | September 2022 | Abandon | 24 | 1 | 0 | No | No |
| 16977613 | BATCH-WISE VERIFICATION OF MULTIPARTY COMPUTATIONS | September 2020 | July 2023 | Allow | 34 | 3 | 0 | No | No |
| 16943653 | COMPUTING SYSTEM AND OPERATING METHOD THEREOF | July 2020 | April 2024 | Allow | 44 | 4 | 0 | Yes | No |
| 16930943 | PRESERVATION SYSTEM FOR PRESERVING PRIVACY OF OUTSOURCED DATA IN CLOUD BASED ON DEEP CONVOLUTIONAL NEURAL NETWORK | July 2020 | May 2024 | Abandon | 46 | 3 | 0 | No | No |
| 16915643 | SYSTEMS, CIRCUITS AND COMPUTER PROGRAM PRODUCTS PROVIDING A FRAMEWORK FOR SECURED COLLABORATIVE TRAINING USING HYPER-DIMENSIONAL VECTOR BASED DATA ENCODING/DECODING AND RELATED METHODS | June 2020 | November 2022 | Allow | 28 | 1 | 0 | Yes | No |
| 16903528 | METHODS, SYSTEMS, AND DEVICES TO DYNAMICALLY DETERMINE AN AUTHENTICATION METHOD FOR A USER DEVICE TO ACCESS SERVICES BASED ON SECURITY RISK | June 2020 | September 2023 | Allow | 38 | 3 | 0 | Yes | No |
| 16880149 | SPLIT KEYS FOR WALLET RECOVERY | May 2020 | September 2023 | Allow | 40 | 3 | 0 | Yes | No |
| 16853719 | System and Method for Secure Causality Discovery | April 2020 | August 2022 | Abandon | 28 | 1 | 0 | No | No |
| 16649514 | SMART CONTRACT EXECUTION USING DISTRIBUTED COORDINATION | March 2020 | November 2025 | Allow | 60 | 7 | 0 | Yes | No |
| 16702786 | AUDITABLE PRIVACY PROTECTION DEEP LEARNING PLATFORM CONSTRUCTION METHOD BASED ON BLOCK CHAIN INCENTIVE MECHANISM | December 2019 | July 2023 | Allow | 44 | 2 | 0 | No | No |
| 16589920 | METHOD FOR PERFORMING USER AUTHENTICATION AND FUNCTION EXECUTION SIMULTANEOUSLY AND ELECTRONIC DEVICE FOR THE SAME | October 2019 | September 2023 | Abandon | 47 | 3 | 0 | No | No |
| 16582709 | BIOMETRIC IDENTITY VERIFICATION AND PROTECTION SOFTWARE SOLUTION | September 2019 | September 2022 | Abandon | 36 | 1 | 0 | No | No |
| 16504926 | SYSTEMS AND METHODS FOR SECURING INFORMATION | July 2019 | December 2023 | Allow | 53 | 4 | 0 | No | No |
| 16453528 | STACKED ARTIFICIAL NEURAL NETWORKS | June 2019 | March 2024 | Allow | 56 | 4 | 0 | Yes | No |
| 16361203 | ANTI-SPOOFING FACE ID SENSING USING TWO CAMERAS | March 2019 | February 2024 | Abandon | 59 | 4 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner KOBROSLI, SHADI HASSAN.
With a 50.0% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 50.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner KOBROSLI, SHADI HASSAN works in Art Unit 2492 and has examined 63 patent applications in our dataset. With an allowance rate of 68.3%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 38 months.
Examiner KOBROSLI, SHADI HASSAN's allowance rate of 68.3% places them in the 30% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by KOBROSLI, SHADI HASSAN receive 2.83 office actions before reaching final disposition. This places the examiner in the 82% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by KOBROSLI, SHADI HASSAN is 38 months. This places the examiner in the 30% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +53.9% benefit to allowance rate for applications examined by KOBROSLI, SHADI HASSAN. This interview benefit is in the 95% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 28.4% of applications are subsequently allowed. This success rate is in the 52% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 7.8% of cases where such amendments are filed. This entry rate is in the 8% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 9% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 60.0% of appeals filed. This is in the 36% percentile among all examiners. Of these withdrawals, 33.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 22% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.