Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19041984 | CYBER RESILIENCE AGENTIC MESH | January 2025 | April 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19040705 | INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODES | January 2025 | April 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19021683 | NETWORK EDGE DIGITAL TWIN FOR IOT ATTACK DETECTION | January 2025 | March 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18963186 | PROBABILISTIC EVENT LINKING | November 2024 | February 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18961324 | ALARM DATA PROCESSING METHOD, APPARATUS, MEDIUM AND ELECTRONIC DEVICE | November 2024 | February 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18946217 | Systems and Methods for Intelligent Analysis and Deployment of Cybersecurity Assets in a Cybersecurity Threat Detection and Mitigation Platform | November 2024 | January 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18932967 | CYBER THREAT DETECTION BASED ON THREAT CONTEXT, THREAT CHANGES, AND/OR IMPACT STATUS | October 2024 | May 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18923017 | LIGHTWEIGHT INTRUSION DETECTION METHOD AND SYSTEM OF INTERNET OF VEHICLES BASED ON KNOWLEDGE DISTILLATION | October 2024 | January 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18914035 | DETECTING MALICIOUS ACTIVITY USING USER-SPECIFIC PARAMETERS | October 2024 | December 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18829996 | THREAT CLASSIFICATION IN A STREAMING SYSTEM | September 2024 | November 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18829109 | SYSTEM FOR CYBERSECURITY CAMPAIGN ARTIFACT DISCOVERY AND TASKING | September 2024 | March 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18824956 | Secure localization method for multi-mobile robots based on network communication | September 2024 | November 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18752409 | METHODS AND APPARATUSES TO PROVIDE INFORMATION SECURITY TO AN ENTITY BY USING MULTIPLE CLOUD-BASED APPLICATION SERVICES | June 2024 | February 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18737481 | TECHNIQUES FOR INCIDENT RESPONSE AND STATIC ANALYSIS REPRESENTATION IN COMPUTING ENVIRONMENTS | June 2024 | August 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18669276 | Systems and Methods for Intelligent Analysis and Deployment of Cybersecurity Assets in a Cybersecurity Threat Detection and Mitigation Platform | May 2024 | August 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18646124 | Systems Using an Authorization Service User Interface for Secure Role-Based Access Control | April 2024 | February 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 18593371 | SYSTEMS AND METHODS FOR CONTROLLED ACCESS TO POLICY DATA ON BLOCKCHAIN | March 2024 | March 2025 | Allow | 13 | 0 | 0 | Yes | No |
| 18592069 | SYSTEMS AND METHODS FOR ACCELERATED REMEDIATIONS OF CYBERSECURITY ALERTS AND CYBERSECURITY EVENTS IN A CYBERSECURITY EVENT DETECTION AND RESPONSE PLATFORM | February 2024 | January 2025 | Allow | 11 | 0 | 0 | Yes | No |
| 18444928 | Cloud Data Security Posture Detection Based On Network Communication Paths And Sensitivity Data | February 2024 | February 2025 | Allow | 12 | 0 | 0 | Yes | No |
| 18442946 | TECHNIQUES FOR GENERATING SIGNATURES CHARACTERIZING ADVANCED APPLICATION LAYER FLOOD ATTACK TOOLS | February 2024 | November 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18412556 | IDENTIFYING FRAUDULENT REQUESTS FOR CONTENT | January 2024 | November 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18411495 | SYSTEMS AND METHODS FOR CONTROLLED ACCESS TO BLOCKCHAIN DATA | January 2024 | October 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18396393 | SYSTEMS AND METHODS FOR USING A NETWORK ACCESS DEVICE TO SECURE A NETWORK PRIOR TO REQUESTING ACCESS TO THE NETWORK BY THE NETWORK ACCESS DEVICE | December 2023 | October 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18545330 | SYSTEMS AND METHODS FOR DETECTING KEYBOARD CHARACTERISTICS | December 2023 | July 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18492714 | DETECTING ANOMALOUS DOWNLOADS | October 2023 | May 2025 | Allow | 19 | 1 | 0 | Yes | No |
| 18469721 | METHOD FOR DETECTING AND ANALYZING TIME-SERIES DATA BASED ON CYBER THREAT FRAMEWORK | September 2023 | May 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18369394 | MICROSERVICES ANOMALY DETECTION | September 2023 | April 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18466261 | METHODS FOR AUTHENTICATION AND KEY MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK AND RELATED APPARATUSES | September 2023 | March 2025 | Allow | 18 | 2 | 0 | Yes | No |
| 18465312 | SYSTEMS AND METHODS FOR PRIVATE AUTHENTICATION WITH HELPER NETWORKS | September 2023 | July 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18456022 | SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO A BLOCKCHAIN | August 2023 | November 2024 | Allow | 14 | 0 | 0 | Yes | No |
| 18225737 | RAPID DEVELOPMENT OF MALICIOUS CONTENT DETECTORS | July 2023 | March 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18259648 | IDENTIFYING COMPUTER SYSTEMS FOR MALWARE INFECTION MITIGATION | June 2023 | October 2024 | Allow | 16 | 3 | 0 | Yes | No |
| 18334637 | AUTOMATED ALERT DEDUPLICATION OR SUPPRESSION IN DATA PROCESSING SYSTEMS BASED ON RECURRING DATA IDENTIFIERS | June 2023 | March 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18310142 | EMBEDDED CONTROLLER METHOD FOR PREVENTION OF DENIAL OF SERVICE ATTACKS | May 2023 | May 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18034683 | METHOD AND SYSTEM FOR COMMUNICATION BETWEEN SERVER AND AUTHENTICATOR | April 2023 | March 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18031640 | METHOD FOR DETECTION OF MALWARE | April 2023 | March 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18131448 | VERIFICATION METHOD, VERIFICATION APPARATUS, AND STORAGE MEDIUM INCLUDING PROGRAM STORED THEREIN | April 2023 | May 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18130167 | THREAT MITIGATION SYSTEM AND METHOD | April 2023 | October 2024 | Allow | 18 | 2 | 0 | Yes | No |
| 18130152 | THREAT MITIGATION SYSTEM AND METHOD | April 2023 | August 2024 | Allow | 16 | 2 | 0 | Yes | No |
| 18188012 | SYSTEM AND METHOD FOR DEVICE AUTHENTICATION IN A DISTRIBUTED ENVIRONMENT USING A TWIN INFERENCE MODEL | March 2023 | April 2025 | Allow | 25 | 0 | 0 | Yes | No |
| 18146063 | SELF-CONSISTENT STRUCTURES FOR SECURE TRANSMISSION AND TEMPORARY STORAGE OF SENSITIVE DATA | December 2022 | May 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 17977066 | SYSTEMS AND METHODS FOR PRIVATE AUTHENTICATION WITH HELPER NETWORKS | October 2022 | June 2025 | Allow | 32 | 1 | 0 | Yes | No |
| 17946595 | Method and Apparatus for Providing Isolated Asset Access in a Layered Security System | September 2022 | March 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17882429 | USER ACTIVITY-TRIGGERED URL SCAN | August 2022 | December 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17858910 | SYSTEMS AND TECHNIQUES FOR AUTHENTICATION AND SECURITY | July 2022 | February 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 17781237 | DETECTING DEVICE, TAMPER DETECTING SYSTEM, CENTRAL SERVER, PARTICIPANT SERVER, TAMPER DETECTING METHOD, AND PROGRAM | May 2022 | December 2024 | Abandon | 30 | 1 | 0 | Yes | No |
| 17664920 | COLLECTING ENDPOINT DATA AND NETWORK DATA TO DETECT AN ANOMALY | May 2022 | January 2025 | Allow | 32 | 2 | 0 | Yes | No |
| 17736111 | SYSTEM AND METHOD FOR SOCIAL NETWORK ANALYSIS | May 2022 | February 2025 | Allow | 34 | 1 | 0 | Yes | No |
| 17704068 | Security Compatibility Testing and Configuration Platform | March 2022 | May 2025 | Allow | 38 | 3 | 0 | Yes | No |
| 17583687 | SYSTEM AND METHODS FOR IMPLEMENTING PRIVATE IDENTITY | January 2022 | February 2025 | Allow | 37 | 1 | 0 | Yes | No |
No appeal data available for this record. This may indicate that no appeals have been filed or decided for applications in this dataset.
Examiner CHAMPAKESAN, BADRI NARAYANAN works in Art Unit 2494 and has examined 28 patent applications in our dataset. With an allowance rate of 96.4%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 23 months.
Examiner CHAMPAKESAN, BADRI NARAYANAN's allowance rate of 96.4% places them in the 89% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.
On average, applications examined by CHAMPAKESAN, BADRI NARAYANAN receive 0.93 office actions before reaching final disposition. This places the examiner in the 10% percentile for office actions issued. This examiner issues significantly fewer office actions than most examiners.
The median time to disposition (half-life) for applications examined by CHAMPAKESAN, BADRI NARAYANAN is 23 months. This places the examiner in the 75% percentile for prosecution speed. Applications move through prosecution relatively quickly with this examiner.
When applicants file an RCE with this examiner, 45.0% of applications are subsequently allowed. This success rate is in the 95% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 50.0% of cases where such amendments are filed. This entry rate is in the 70% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants file petitions regarding this examiner's actions, 0.0% are granted (fully or in part). This grant rate is in the 2% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 15% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 20% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.