USPTO Examiner ABRISHAMKAR KAVEH - Art Unit 2494

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19254764SYSTEM AND METHODS FOR UNFORGEABLE TELEMETRY IN THE PRESENCE OF CYBERATTACKS ON A COMPUTER PLATFORMJune 2025September 2025Allow200NoNo
19214041CYBERTHREAT HUNTING AND PROTECTION BASED ON CODIFIED INDICATORS OF BEHAVIORMay 2025October 2025Allow510YesNo
19182219TECHNIQUES FOR ASSESSING EXPLOITATIONS IN A RUNTIME ENVIRONMENTApril 2025October 2025Allow510NoNo
19025047GRAPH MODELS OF RELATIONSHIPS BETWEEN DATA STORED IN BLOCKS ON DISTRIBUTED LEDGERS THAT ARE LEARNED THROUGH MACHINE LEARNING AND PLATFORMS FOR CREATING, CATALOGING, AND STORING THE SAMEJanuary 2025February 2026Allow1320NoNo
19020851INFORMATION NOTIFICATION METHOD AND INFORMATION NOTIFICATION DEVICEJanuary 2025June 2025Allow510YesNo
19013980MULTIMODAL DATA FUSION FOR CYBERSECURITY APPLICATIONSJanuary 2025July 2025Allow610YesNo
18888955SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYSSeptember 2024February 2025Allow510NoNo
18888973LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYSSeptember 2024February 2025Allow510NoNo
18888947SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYSSeptember 2024February 2025Allow510NoNo
18887807SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYSSeptember 2024November 2024Allow210NoNo
18887697LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYSSeptember 2024December 2024Allow210NoNo
18887706SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYSSeptember 2024March 2025Allow620NoNo
18785419CLOUD DATA ATTACK SURFACE TRACKING USING GRAPH-BASED EXCESSIVE PRIVILEGE DETECTIONJuly 2024October 2024Allow300YesNo
18781121RISK EVENT DETECTION USING ACTIVITY AND GRAPH-BASED CONTEXT FOR CLOUD DATA SECURITY POSTURE MANAGEMENTJuly 2024February 2025Allow610YesNo
18770937METHODS AND APPARATUS FOR WTRU-TO-WTRU RELAY DISCOVERY SECURITY AND PRIVACYJuly 2024December 2024Allow510NoNo
18743120COMMUTATIVE ENCRYPTION AND WATERMARKING METHOD BASED ON CHAOTIC SYSTEM AND ZERO WATERMARK FOR VECTOR GEOSPATIAL DATAJune 2024September 2024Allow300NoNo
18737679IDENTITY-BY-DESCENT RELATEDNESS BASED ON FOCAL AND REFERENCE SEGMENTSJune 2024November 2024Allow510NoNo
18732546CLOUD SECURITY VISUAL DASHBOARDJune 2024March 2026Allow2110YesNo
18670003SECURITY AND PRIVACY INSPECTION OF BIDIRECTIONAL GENERATIVE ARTIFICIAL INTELLIGENCE TRAFFIC USING A REVERSE PROXYMay 2024December 2024Allow710YesNo
18670032EFFICIENT TRAINING DATA GENERATION FOR TRAINING MACHINE LEARNING MODELS FOR SECURITY AND PRIVACY INSPECTION OF BIDIRECTIONAL GENERATIVE ARTIFICIAL INTELLIGENCE TRAFFICMay 2024December 2024Allow710YesNo
18631478SMALL-FOOTPRINT ENDPOINT DATA LOSS PREVENTIONApril 2024December 2025Allow2010NoNo
18630359ENCODER, A DECODER AND CORRESPONDING METHODS USING FOR IBC MERGE LISTApril 2024February 2026Allow2220NoNo
18622522METHOD TO INTELLIGENTLY MANAGE THE END TO END CONTAINER COMPLIANCE IN CLOUD ENVIRONMENTSMarch 2024May 2025Allow1410NoNo
18616585PERMISSIONS ENFORCEMENT BETWEEN FIRST AND THIRD PARTY PLATFORMSMarch 2024March 2026Allow2310NoNo
18617210SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYSMarch 2024October 2024Allow620NoNo
18611419SYSTEM AND METHOD FOR PROCESSING RESTRICTION-BASED INTERACTIONS BY PERFORMING MULTIPLE ENTITY VALIDATIONSMarch 2024July 2025Allow1600NoNo
18693583MONITORING A COMPUTING SYSTEM WITH RESPECT TO A RECOVERY SCENARIOMarch 2024February 2026Allow2310NoNo
18607223TEXT-BASED TAGGING OF SECURITY DEFICIENCIES USING GENERATIVE MACHINE LEARNING MODELSMarch 2024October 2025Allow1900NoNo
18600321CONTAINER COMPUTE PLATFORMMarch 2024January 2026Allow2310NoNo
18594148Communication Policy Compliance EvaluatorMarch 2024November 2025Allow2010NoNo
18588981SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING SSH PRIVATE KEYSFebruary 2024June 2024Allow410NoNo
18585106MULTI-LAYERED SECURE AUTHENTICATION PROTOCOL FOR SECURING DIGITAL TRANSACTIONSFebruary 2024November 2025Allow2110NoNo
18585329SYMMETRICAL ISSUANCE AND DESTRUCTION SYSTEM FOR RIGHT AND OBLIGATION TOKENS AND METHOD THEREOFFebruary 2024July 2025Allow1700NoNo
18583284METHOD AND APPARATUS FOR DYNAMIC DATA ENCRYPTION IN A COMMUNICATION SYSTEM WITH FORWARD SECRECYFebruary 2024October 2025Allow2010NoNo
18581363SYSTEMS AND METHODS FOR GOVERNING USE RIGHTS OF DIGITAL ASSETS ACROSS HETEROGENEOUS VIRTUAL PLATFORMSFebruary 2024March 2026Allow2410NoNo
18441626SYSTEMS AND METHODS OF INFORMATION SECURITY MONITORING WITH THIRD-PARTY INDICATORS OF COMPROMISEFebruary 2024January 2026Allow2320NoNo
18432575SYSTEM AND METHODS FOR AUTOMATED COMPUTER SECURITY POLICY GENERATION AND ANOMALY DETECTIONFebruary 2024August 2025Allow1810NoNo
18423109AUTHORIZATION AND REFUSAL OF MODIFICATION, AND PARTIAL MODIFICATION ABILITY, OF A NETWORK IDENTIFIERJanuary 2024August 2025Allow1920NoNo
18410707PROGRAMMABLE INTEGRATED CIRCUIT CONFIGURED AS A REMOTE TRUST ANCHOR TO SUPPORT MULTITENANCYJanuary 2024February 2026Allow2520YesNo
18405460SYSTEM AND METHOD FOR MACHINE LEARNING BASED SECURITY INCIDENTS DETECTION AND CLASSIFICATION IN A BLOCKCHAIN ECOSYSTEMJanuary 2024January 2026Allow2410NoNo
18394109SYSTEMS AND METHODS FOR IDENTIFYING MALICIOUS CRYPTOGRAPHIC ADDRESSESDecember 2023August 2024Allow810NoNo
18394608LATERAL MOVEMENT ANALYSIS USING CERTIFICATE PRIVATE KEYSDecember 2023July 2024Allow620NoNo
18393487METHOD FOR USING GENERATIVE LARGE LANGUAGE MODELS (LLM) FOR CYBERSECURITY DECEPTION AND HONEYPOTSDecember 2023June 2025Allow1800NoNo
18568330RISK ANALYSIS APPARATUS, METHOD, AND COMPUTER-READABLE MEDIUMDecember 2023October 2025Allow2210YesNo
18530502SUSPICIOUS GROUP DETECTIONDecember 2023August 2024Allow810NoNo
18498384MANAGEMENT CONTROLLER REGISTRATION USING A TRUSTED PLATFORM MODULEOctober 2023August 2025Allow2110NoNo
18557027DETECTION DEVICE, DETECTION METHOD, AND DETECTION PROGRAMOctober 2023January 2026Allow2710YesNo
18490288SYSTEMS AND METHODS FOR ENABLING PARALLELIZED VERIFICATION OF FORENSIC COPIES USING NON-PARALLELIZABLE ALGORITHMSOctober 2023August 2025Allow2210YesNo
18489174SYSTEMS AND METHODS FOR VULNERABILITY SCANNING OF DEPENDENCIES IN CONTAINERSOctober 2023November 2025Allow2510NoNo
18485175FINE-GRAINED AUTHORIZATION AS A SERVICE VIA RELATIONSHIP- BASED ACCESS CONTROL WITHIN A MULTI-TENANT SYSTEMOctober 2023August 2025Allow2210YesNo
18376213SECURELY PROCESSING A CONTINGENT ACTION TOKENOctober 2023June 2025Allow2000NoNo
18374788Electronic Mail VerificationSeptember 2023August 2024Allow1010NoNo
18474974SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT USING CLOUD ACCESS KEYSSeptember 2023February 2024Allow520NoNo
18464515UNAUTHORIZED ACCESS DETECTION DEVICE AND UNAUTHORIZED ACCESS DETECTION METHODSeptember 2023January 2026Allow2910NoNo
18281235ANALYSIS CONDITION GENERATING APPARATUS, ANALYSIS SYSTEM, ANALYSIS CONDITION GENERATING PROGRAM, ANALYSIS PROGRAM, ANALYSIS CONDITION GENERATING METHOD, AND ANALYSIS METHODSeptember 2023October 2025Allow2510NoNo
18243536Smart wearable devices and system thereforSeptember 2023February 2026Allow2920YesNo
18460415ARTIFICIAL INTELLIGENCE TECHNIQUES FOR IDENTIFYING IDENTITY MANIPULATIONSeptember 2023October 2025Allow2510YesNo
18456132INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCTAugust 2023September 2025Allow2510NoNo
18452939SYSTEM AND METHOD TO QUANTIFY DOMAIN-CENTRIC RISKAugust 2023January 2026Abandon2910NoNo
18448636TRIGGERING AND DOWNSELECTION OF VOLATILE MEMORY SCANNINGAugust 2023March 2026Allow3120YesNo
18230366Stateful Clustering MethodsAugust 2023February 2026Allow3120YesNo
18356619METHOD FOR PROCESSING TRAFFIC IN PROTECTION DEVICE, AND PROTECTION DEVICEJuly 2023August 2025Allow2510NoNo
18223631SECURE METHODS AND SYSTEMSJuly 2023June 2024Allow1110NoNo
18347790METHODS AND SYSTEMS FOR IDENTIFYING PATTERNS IN DATA USING DELIMITED FEATURE-REGIONSJuly 2023December 2024Allow1720NoNo
18336881Method And Apparatus For Measuring Information System Device Integrity And Evaluating Endpoint PostureJune 2023June 2025Abandon2420NoNo
18265441DETECTION DEVICE, DETECTION METHOD, AND DETECTION PROGRAMJune 2023July 2025Allow2610YesNo
18329294TRACKING AND ANALYSES OF CONTENT PRESENTATIONJune 2023June 2024Allow1210NoNo
18034872END TO END ENCRYPTED BROWSE BASED AD HOC COMMUNICATIONMay 2023July 2025Allow2710NoNo
18308043METHOD AND APPARATUS FOR MALICIOUS FILE EXTENSION DETECTIONApril 2023August 2025Allow2810NoNo
18307046Machine-to-Machine Network Assisted BootstrappingApril 2023August 2024Allow1620NoNo
18186156AUTOMATED ZERO TRUST SECURITY VALIDATIONMarch 2023December 2025Abandon3210NoNo
18181799SYSTEMS AND METHODS FOR AR/VR DEVICE IMPROVEMENTSMarch 2023June 2025Abandon2702YesNo
18148101DECENTRALIZED ACCESS CONTROL FOR AUTHORIZED MODIFICATIONS OF DATA USING A CRYPTOGRAPHIC HASHDecember 2022August 2025Allow3210NoNo
18087959BINDING CONFIGURATION STATE TO A BLOCKCHAINDecember 2022September 2025Abandon3310NoNo
18084045LEARNED CONTROL FLOW MONITORING AND ENFORCEMENT OF UNOBSERVED TRANSITIONSDecember 2022November 2025Allow3510YesNo
18056996ENDPOINT ASSESSMENT DEDUPLICATIONNovember 2022July 2025Allow3210NoNo
18053608QUANTUM SERVICE AUTHORIZATION MANAGEMENT FOR SECURITIZING 5G NETWORK SLICINGNovember 2022April 2025Allow2910NoNo
17997517DEVICE PROTECTION METHOD, AND DEVICESOctober 2022April 2025Allow2910NoNo
17975978AUTHENTICATING A USER INTERACTING WITH A WIRELESS TELECOMMUNICATION NETWORK VIA A NON-INTERNET CONNECTED PHONEOctober 2022February 2025Allow2810NoNo
17976212AUTOMATIC PERIODIC PRE-SHARED KEY UPDATEOctober 2022May 2025Allow3120NoNo
18049909SYSTEM AND METHOD FOR COMBINING CYBER-SECURITY THREAT DETECTIONS AND ADMINISTRATOR FEEDBACKOctober 2022November 2025Allow3610NoNo
18048805SYSTEMS AND METHODS FOR PROVIDING PRIORITIZATION FOR DATA TRANSPORT SERVICESOctober 2022February 2025Allow2810YesNo
18048320CONTROLLING ACCESS TO SECURED DATA VIA TIMED FILTERING OF DATAOctober 2022February 2025Allow2810NoNo
17967220Authenticating Usage Data For Processing By Machine Learning ModelsOctober 2022February 2025Allow2810YesNo
17936135TOKENIZED INDUSTRIAL AUTOMATION SOFTWARESeptember 2022January 2026Allow3932YesNo
17955421METHOD AND SYSTEM FOR DISTRIBUTING KEYSSeptember 2022May 2025Allow3120NoNo
17934979INDUSTRIAL BLOCKCHAIN ENABLED AUTOMATION CONTROLSeptember 2022February 2025Allow2911NoNo
17899501METHODS AND SYSTEMS FOR ANONYMIZING GENOME SEGMENTS AND SEQUENCES AND ASSOCIATED INFORMATIONAugust 2022August 2024Abandon2420NoNo
17897264COMMUNICATION APPARATUSAugust 2022February 2025Allow3010NoNo
17893728METHOD(S) AND SYSTEM(S) FOR UTILIZING AN INDEPENDENT SERVER TO FACILITATE SECURE EXCHANGE OF DATAAugust 2022October 2024Allow2610YesNo
17800840UTILIZATION MANAGEMENT DEVICE, UTILIZATION MANAGEMENT METHOD, AND PROGRAMAugust 2022May 2025Allow3320YesNo
17888037SYSTEMS AND METHODS FOR ENCRYPTING DIALOGUE BASED DATA IN A DATA STORAGE SYSTEMAugust 2022November 2024Allow2710NoNo
17878103Methods and Systems for Classification of Sensitive Electronic ResourcesAugust 2022March 2025Abandon3210NoNo
17877205UNIFIED PARKED DOMAIN DETECTION SYSTEMJuly 2022November 2024Allow2710NoNo
17876190IDENTITY-BASED POLICY ENFORCEMENT IN WIDE AREA NETWORKSJuly 2022October 2024Allow2610YesNo
17868576PROVIDING SINGLE-SIGN-ON FOR MULTIFACTOR AUTHENTICATIONJuly 2022November 2024Allow2710YesNo
17868543PRE-OPERATING SYSTEM EMBEDDED CONTROLLER HARDENING BASED ON OPERATING SYSTEM SECURITY AWARENESSJuly 2022March 2025Allow3230YesNo
17868295USER AUTHENTICATION IN A PREMISES SECURITY SYSTEMJuly 2022January 2025Allow3020NoNo
17787905METHOD AND SYSTEM FOR AUTHENTICATION AND AUTHORIZATIONJune 2022September 2024Allow2610YesNo
17841199GUIDED NAVIGATION OF ELECTRONIC DOCUMENTSJune 2022May 2025Allow3520YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner ABRISHAMKAR, KAVEH.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
30
Examiner Affirmed
22
(73.3%)
Examiner Reversed
8
(26.7%)
Reversal Percentile
42.6%
Lower than average

What This Means

With a 26.7% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
58
Allowed After Appeal Filing
16
(27.6%)
Not Allowed After Appeal Filing
42
(72.4%)
Filing Benefit Percentile
40.5%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 27.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner ABRISHAMKAR, KAVEH - Prosecution Strategy Guide

Executive Summary

Examiner ABRISHAMKAR, KAVEH works in Art Unit 2494 and has examined 471 patent applications in our dataset. With an allowance rate of 83.9%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 28 months.

Allowance Patterns

Examiner ABRISHAMKAR, KAVEH's allowance rate of 83.9% places them in the 58% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by ABRISHAMKAR, KAVEH receive 2.13 office actions before reaching final disposition. This places the examiner in the 57% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by ABRISHAMKAR, KAVEH is 28 months. This places the examiner in the 68% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +12.0% benefit to allowance rate for applications examined by ABRISHAMKAR, KAVEH. This interview benefit is in the 48% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 31.6% of applications are subsequently allowed. This success rate is in the 65% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 35.0% of cases where such amendments are filed. This entry rate is in the 52% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 72.7% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 59% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 52.4% of appeals filed. This is in the 23% percentile among all examiners. Of these withdrawals, 36.4% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.

Petition Practice

When applicants file petitions regarding this examiner's actions, 45.9% are granted (fully or in part). This grant rate is in the 40% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 1.3% of allowed cases (in the 70% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.5% of allowed cases (in the 55% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

    Relevant MPEP Sections for Prosecution Strategy

    • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
    • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
    • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
    • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
    • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
    • MPEP § 1214.07: Reopening prosecution after appeal

    Important Disclaimer

    Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

    No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

    Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

    Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.