USPTO Examiner KORSAK OLEG - Art Unit 2492

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19226046SYSTEM AND METHOD FOR SOFTWARE INTEGRATION INTO ENTERPRISE STANDARD CONTROL SYSTEMS USING STANDARDIZED APIsJune 2025October 2025Allow510NoNo
19089705DECENTRALIZED INTEGRATION SOLUTIONS FOR SECURELY CONDUCTING LEGAL TRANSACTIONS AND PROTECTING SENSITIVE DATAMarch 2025August 2025Allow510YesNo
18942118MULTIMEDIA CONTAINER FOR PHYSICAL OBJECT AUTHENTICATION AND VERIFICATION OF ATTENDANCENovember 2024January 2026Abandon1530YesNo
18814720CIPHERTEXT CONVERSION SYSTEM, CIPHERTEXT CONVERSION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUMAugust 2024February 2026Allow1810NoNo
18811402SCALABLE SEARCH AND RANKING OF BIOMETRIC SIGNATURESAugust 2024March 2026Allow1910YesNo
18806047CONTROL LINK FOR ADULT TOY OPERATION AND METHOD FOR USING THE SAMEAugust 2024March 2025Allow720NoNo
18787250SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDSJuly 2024April 2025Allow820NoNo
18670367PHYSICALLY UNCLONABLE FUNCTION (PUF) GENERATIONMay 2024March 2026Allow2210NoNo
18668612SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS USING RISK FACTORSMay 2024November 2024Allow610NoNo
18647943Systems and Methods for a Cryptographic File System LayerApril 2024November 2025Allow1910NoNo
18629283NESTED BLOCKCHAIN SYSTEMApril 2024January 2026Allow2210NoNo
18697423METHOD AND SYSTEM FOR PROCESSING FULL-STACK NETWORK CARD TASK BASED ON FPGAMarch 2024September 2024Allow610YesNo
18600727COMPLEX IT PROCESS ANNOTATION, TRACING, ANALYSIS, AND SIMULATIONMarch 2024October 2025Allow1900NoNo
18598654METHOD,APPARATUS,STORAGE MEDIUM AND ELECTRONIC DEVICE FOR NETWORK AUTHENTICATIONMarch 2024November 2025Allow2010NoNo
18595462CREATING SIMULATION MODELS FOR COMPLEX ADAPTIVE SYSTEMS USING A MULTI-MODEL, GENERATIVE APPROACHMarch 2024October 2025Allow2010NoNo
18595449MODELING MULTI-PERIL CATASTROPHE USING A DISTRIBUTED SIMULATION ENGINEMarch 2024October 2025Allow1900NoNo
18592170METHODS AND SYSTEMS FOR PROVIDING NETWORK CONNECTIVITY TO A SECURE ACCESS SERVICE EDGE (SASE) DOMAIN VIA AN ISPFebruary 2024January 2026Allow2310YesNo
18585880SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDSFebruary 2024March 2026Allow2510NoNo
18585274MULTI-VENDOR WEB SECURITY CONTROL INTEGRATION AND MANAGEMENT PLATFORMFebruary 2024January 2026Allow2310NoNo
18585545Tying Access/Redaction to Authentication LevelsFebruary 2024January 2026Allow2320YesNo
18582051Blocking of Exfiltration Events via Browser ExtensionsFebruary 2024October 2025Allow2010YesNo
18443976SYNTHETIC REQUEST INJECTION FOR REAL-TIME CLOUD SECURITY POSTURE MANAGEMENTFebruary 2024June 2025Allow1610YesNo
18443055ABUSE MAILBOX FOR FACILITATING DISCOVERY, INVESTIGATION, AND ANALYSIS OF EMAIL-BASED THREATSFebruary 2024July 2025Allow1710YesNo
18423173CRYPTOGRAPHIC METHODS AND SYSTEMS USING ACTIVATION CODES FOR DIGITAL CERTIFICATE REVOCATIONJanuary 2024September 2025Allow1920NoNo
18419534Method and System for Forensic Data TrackingJanuary 2024April 2025Allow1510NoNo
18416222Secure Messaging Service with Digital Rights Management Using Blockchain TechnologyJanuary 2024December 2025Allow2320YesNo
18401754METHODS AND SYSTEMS FOR COUNSELING A USER WITH RESPECT TO SUPERVISED CONTENTJanuary 2024July 2025Abandon1910NoNo
18391617Performing Security Protocol Transitions While Executing An Execution Environment Of A Virtual Cloud NetworkDecember 2023December 2025Allow2420YesNo
18543102TELEMETRY-INITIATED MITIGATIONS IN A ZERO-TRUST COMPUTING ENVIRONMENTDecember 2023September 2025Allow2000NoNo
18539640MANAGING EDGE NETWORK PROTECTION SERVICEDecember 2023December 2025Allow2410NoNo
18533768MULTI-VENDOR WEB SECURITY CONTROL INTEGRATION AND MANAGEMENT PLATFORMDecember 2023December 2025Allow2410NoNo
18528346REAL TIME APPLICATION PROTECTION SYSTEM CONFIGURATION DRIFT CATEGORIZATION AND RESPONSEDecember 2023March 2026Allow2720YesNo
18517924Method for Providing Restricted Service, and Communications DeviceNovember 2023August 2025Allow2110NoNo
18508150Systems and methods for abnormal Classless Inter-Domain Routing (CIDR) access detectionNovember 2023January 2026Allow2620NoNo
18386341SYSTEMS AND METHODS OF KEY SELECTION FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDSNovember 2023April 2025Allow1710NoNo
18558417AUTHENTICATED ENCRYPTION APPARATUS, AUTHENTICATED DECRYPTION APPARATUS, AUTHENTICATED ENCRYPTION SYSTEM, METHOD, AND COMPUTER READABLE MEDIUMNovember 2023December 2025Abandon2510NoNo
18385387METHOD FOR SUPPORTING DECISION-MAKING IN SECURITY CONTROL ENVIRONMENT BASED ON ARTIFICIAL INTELLIGENCEOctober 2023July 2025Allow2010NoNo
18495429NETWORK CONNECTIVITY POLICY MANAGEMENT SYSTEMOctober 2023July 2025Allow2010NoNo
18489145DATACENTER SECURE CONTROL MODULE (DC-SCM) AS-A-SERVICE SYSTEMOctober 2023August 2025Allow2210YesNo
18487726SECURE WEB RTC REAL TIME COMMUNICATIONS SERVICE FOR AUDIO AND VIDEO STREAMING COMMUNICATIONSOctober 2023September 2025Allow2310NoNo
18483018REAL-TIME ORCHESTRATION ENGINEOctober 2023June 2025Allow2120YesNo
18482947DYNAMIC USER INTERFACE (UI) FRAMEWORKOctober 2023April 2025Allow1810YesNo
18482642FORWARD OR DROP PACKETS IN CASE OF URPF VIOLATION AND NOTIFY CONTROLLER VIA GRPC/SFLOW/IPFIXOctober 2023March 2026Allow2920NoNo
18481512ACTIVE DATA LOSS PREVENTION (DLP) ENGINEOctober 2023April 2025Allow1810YesNo
18480865SINGLE SIGN-ON (SSO) MULTI-IDENTITY PROVIDER (IDP) ENGINEOctober 2023April 2025Allow1810YesNo
18480667STATE MANAGEMENT FOR COMPLEX REAL-TIME WORKFLOWSOctober 2023April 2025Allow1810YesNo
18481091TECHNIQUES FOR ENCRYPTED DISK CYBERSECURITY INSPECTION UTILIZING DISK CLONINGOctober 2023August 2024Allow1130YesNo
18477807SECURE USER EQUIPMENT POLICY DATA IN A COMMUNICATION NETWORK ENVIRONMENTSeptember 2023August 2025Allow2310YesNo
18476896SYSTEMS AND METHODS FOR ENDPOINT MANAGEMENTSeptember 2023June 2025Allow2120YesNo
18371891METHOD FOR VERIFYING SECURITY TECHNOLOGY DEPLOYMENT EFFICACY ACROSS A COMPUTER NETWORKSeptember 2023February 2024Allow510YesNo
18371873METHOD FOR VERIFYING SECURITY TECHNOLOGY DEPLOYMENT EFFICACY ACROSS A COMPUTER NETWORKSeptember 2023September 2025Allow2410NoNo
18371320SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDSSeptember 2023April 2025Allow1810NoNo
18471084UNIFIED LENDING PLATFORMSeptember 2023February 2025Allow1710YesNo
18468584SYSTEMS AND METHODS FOR PERFORMING AN EXTERNAL VULNERABILITY SCAN USING EXTERNAL INTERNET PROTOCOL ADDRESSESSeptember 2023May 2025Allow2000YesNo
18466540SYSTEMS AND METHODS FOR CYBERSECURITY ANALYSIS AND CONTROL OF CLOUD-BASED SYSTEMSSeptember 2023March 2025Allow1810NoNo
18244093SYSTEM AND METHOD FOR ANONYMOUS DATA SHARING AMONG NODES OF A PRIVATE DATA NETWORKSeptember 2023October 2024Allow1320YesNo
18240784CYBERSECURITY CONFIGURATION IN A CLOUD ENVIRONMENTAugust 2023September 2025Allow2510YesNo
18456479EMERGENCY INFORMATION ACCESS ON PORTABLE ELECTRONIC DEVICESAugust 2023April 2025Allow1910YesNo
18234282SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDSAugust 2023November 2025Allow2720YesNo
18364938ENTERPRISE NETWORK THREAT DETECTIONAugust 2023March 2025Allow1910YesNo
18362081CHAT ATTACHMENT SCREENINGJuly 2023January 2025Allow1820YesNo
18361831SYSTEM AND METHOD FOR MIDSERVER FACILITATION OF MASS SCANNING NETWORK TRAFFIC DETECTION AND ANALYSISJuly 2023May 2025Allow2100NoNo
18273429DISPLAY APPARATUS, DISPLAY SYSTEM, DISPLAY METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUMJuly 2023August 2025Allow2510NoNo
18224022USING PKI FOR SECURITY AND AUTHENTICATION OF CONTROL DEVICES AND THEIR DATAJuly 2023February 2024Allow710NoNo
18222857SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDSJuly 2023February 2025Allow1910NoNo
18352165ROUTING TECHNIQUES FOR ENHANCED NETWORK SECURITYJuly 2023April 2025Allow2100NoNo
18351390CONTROL LINK FOR ADULT TOY OPERATION AND METHOD FOR USING THE SAMEJuly 2023October 2025Allow2740YesNo
18349223COMPUTER-IMPLEMENTED PRIVACY ENGINEERING SYSTEM AND METHODJuly 2023January 2026Allow3040NoNo
18348631UNIFIED LENDING PLATFORMJuly 2023September 2023Allow200NoNo
18217666DISTRIBUTED IDENTITY-BASED FIREWALLSJuly 2023February 2025Allow2020YesNo
18346137DEFINING A SECURITY PERIMETER USING KNOWLEDGE OF USER BEHAVIOR WITHIN A CONTENT MANAGEMENT SYSTEMJune 2023September 2025Allow2720YesNo
18216848ASSESSING COORDINATED MALICIOUS BEHAVIOR TOWARDS A SERVICE PROVIDER NETWORKJune 2023March 2025Allow2000NoNo
18344800SYSTEMS AND METHODS FOR PROVIDING SECURITY VALIDATIONS FOR CLOUD-BASED SECURITY ARCHITECTURESJune 2023May 2024Abandon1020YesNo
18343138SYSTEMS AND METHODS FOR AN AT-RISK SYSTEM IDENTIFICATION VIA ANALYSIS OF ONLINE HACKER COMMUNITY DISCUSSIONSJune 2023April 2025Allow2110NoNo
18213465CONTEXTUAL CONTROL OF DIGITAL FILES BUILT ON THE BLOCKCHAIN & PROJECTED IN AUGMENTED REALITYJune 2023February 2025Allow2010NoNo
18340319MULTI-PARTY CONTROLLED TRANSIENT USER CREDENTIALING FOR INTERACTION WITH SECURE DATAJune 2023December 2024Allow1810NoNo
18340068REMEDIATION RESPONSIVE TO A PATTERN OF ALERTSJune 2023May 2025Allow2310NoNo
18340426Systems and Methods for Providing System Wide Cyber Security PoliciesJune 2023February 2026Allow3230YesNo
18213197SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDSJune 2023April 2025Allow2210NoNo
18201979Virtual Browser Application Systems and MethodsMay 2023January 2025Allow2010NoNo
18314092SYSTEMS AND METHODS FOR SECURE REMOTE IDENTITY VERIFICATIONMay 2023November 2024Allow1810NoNo
18313100SHARING ENTITY CHANGES FROM A CLOUD ACCESS SECURITY BROKER (CASB) PROXY TO A CASB APPLICATION PROGRAMMING INTERFACE (API) ENDPOINTMay 2023August 2023Allow300NoNo
18305563Method and System for Forensic Data TrackingApril 2023September 2023Allow510NoNo
18136681SYSTEM AND METHOD FOR ELECTRONIC RESOURCE TRANSFERS IN A DISTRIBUTED NETWORK VIA NETWORK-PAIRED RESOURCE TRANSFER DEVICESApril 2023May 2025Allow2510NoNo
18133992METHOD FOR CHARACTERIZING SECURITY TECHNOLOGY DEPLOYMENT TELEMETRY ACROSS A COMPUTER NETWORKApril 2023September 2024Allow1710NoNo
18299432CYBERSECURITY GUARD FOR CORE NETWORK ELEMENTSApril 2023October 2024Allow1810NoNo
18133257SYSTEMS AND METHODS FOR SIGNALING AN ATTACK ON CONTACTLESS CARDSApril 2023April 2024Allow1210NoNo
18297863METHODS FOR USING ORGANIZATIONAL BEHAVIOR FOR RISK RATINGSApril 2023November 2025Allow3130NoNo
18129575METHOD FOR VERIFYING SECURITY TECHNOLOGY DEPLOYMENT EFFICACY ACROSS A COMPUTER NETWORKMarch 2023May 2024Allow1310NoNo
18119610APPARATUS AND METHODS FOR VERIFYING LEDGER DATAMarch 2023November 2024Abandon2020YesNo
18179601SECURE INCIDENT INVESTIGATION WORKSPACE GENERATION AND INVESTIGATION CONTROLMarch 2023April 2024Allow1310NoNo
18114213CREDENTIAL GENERATION AND DISTRIBUTION METHOD AND SYSTEM FOR A BLOCKCHAIN NETWORKFebruary 2023August 2024Allow1830YesNo
18114186PORTABLE POLICY EXECUTION USING EMBEDDED MACHINESFebruary 2023June 2025Allow2740NoNo
18020328Method for Managing Keys of a Security GroupFebruary 2023February 2024Allow1220NoYes
18165995CONTROLLING ACCESS TO APPLICATION DATAFebruary 2023December 2024Allow2230YesNo
18106393SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDSFebruary 2023April 2024Allow1510NoNo
18163761SYNTHETIC REQUEST INJECTION TO RETRIEVE METADATA FOR CLOUD POLICY ENFORCEMENTFebruary 2023November 2023Allow910NoNo
18157440System and Method for Software-Defined Network Attached Storage (SDNAS) Ransomware Attack Detection and PreventionJanuary 2023May 2025Allow2810YesNo
18099212Systems and Methods for a Cryptographic File System LayerJanuary 2023April 2024Allow1510YesNo
18094658SYSTEMS AND METHODS FOR PERFORMING A SIMULATED PHISHING ATTACKJanuary 2023May 2024Allow1610NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner KORSAK, OLEG.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
33
Examiner Affirmed
18
(54.5%)
Examiner Reversed
15
(45.5%)
Reversal Percentile
68.1%
Higher than average

What This Means

With a 45.5% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
57
Allowed After Appeal Filing
24
(42.1%)
Not Allowed After Appeal Filing
33
(57.9%)
Filing Benefit Percentile
69.8%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 42.1% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner KORSAK, OLEG - Prosecution Strategy Guide

Executive Summary

Examiner KORSAK, OLEG works in Art Unit 2492 and has examined 878 patent applications in our dataset. With an allowance rate of 85.1%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 26 months.

Allowance Patterns

Examiner KORSAK, OLEG's allowance rate of 85.1% places them in the 61% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by KORSAK, OLEG receive 2.10 office actions before reaching final disposition. This places the examiner in the 56% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by KORSAK, OLEG is 26 months. This places the examiner in the 76% percentile for prosecution speed. Applications move through prosecution relatively quickly with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +7.8% benefit to allowance rate for applications examined by KORSAK, OLEG. This interview benefit is in the 37% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 28.0% of applications are subsequently allowed. This success rate is in the 50% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 42.2% of cases where such amendments are filed. This entry rate is in the 64% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 9% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 54.8% of appeals filed. This is in the 26% percentile among all examiners. Of these withdrawals, 22.5% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 28.7% are granted (fully or in part). This grant rate is in the 16% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.8% of allowed cases (in the 59% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

    Relevant MPEP Sections for Prosecution Strategy

    • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
    • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
    • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
    • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
    • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
    • MPEP § 1214.07: Reopening prosecution after appeal

    Important Disclaimer

    Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

    No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

    Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

    Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.