USPTO Examiner CHAMPAKESAN BADRI NARAYANAN - Art Unit 2494

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19041984CYBER RESILIENCE AGENTIC MESHJanuary 2025April 2025Allow200YesNo
19040705INTELLIGENT SEARCH NETWORK FOR TIME-BASED DETECTION OF COMPROMISED NETWORK NODESJanuary 2025April 2025Allow200YesNo
19021683NETWORK EDGE DIGITAL TWIN FOR IOT ATTACK DETECTIONJanuary 2025March 2025Allow200YesNo
18963186PROBABILISTIC EVENT LINKINGNovember 2024February 2025Allow300YesNo
18961324ALARM DATA PROCESSING METHOD, APPARATUS, MEDIUM AND ELECTRONIC DEVICENovember 2024February 2025Allow300YesNo
18946217Systems and Methods for Intelligent Analysis and Deployment of Cybersecurity Assets in a Cybersecurity Threat Detection and Mitigation PlatformNovember 2024January 2025Allow200YesNo
18932967CYBER THREAT DETECTION BASED ON THREAT CONTEXT, THREAT CHANGES, AND/OR IMPACT STATUSOctober 2024May 2025Allow610YesNo
18923017LIGHTWEIGHT INTRUSION DETECTION METHOD AND SYSTEM OF INTERNET OF VEHICLES BASED ON KNOWLEDGE DISTILLATIONOctober 2024January 2025Allow300YesNo
18914035DETECTING MALICIOUS ACTIVITY USING USER-SPECIFIC PARAMETERSOctober 2024December 2024Allow200YesNo
18829996THREAT CLASSIFICATION IN A STREAMING SYSTEMSeptember 2024November 2024Allow200YesNo
18829109SYSTEM FOR CYBERSECURITY CAMPAIGN ARTIFACT DISCOVERY AND TASKINGSeptember 2024March 2025Allow610YesNo
18824956Secure localization method for multi-mobile robots based on network communicationSeptember 2024November 2024Allow300YesNo
18752409METHODS AND APPARATUSES TO PROVIDE INFORMATION SECURITY TO AN ENTITY BY USING MULTIPLE CLOUD-BASED APPLICATION SERVICESJune 2024February 2025Allow810YesNo
18737481TECHNIQUES FOR INCIDENT RESPONSE AND STATIC ANALYSIS REPRESENTATION IN COMPUTING ENVIRONMENTSJune 2024August 2024Allow200YesNo
18669276Systems and Methods for Intelligent Analysis and Deployment of Cybersecurity Assets in a Cybersecurity Threat Detection and Mitigation PlatformMay 2024August 2024Allow300YesNo
18646124Systems Using an Authorization Service User Interface for Secure Role-Based Access ControlApril 2024February 2025Allow1000YesNo
18593371SYSTEMS AND METHODS FOR CONTROLLED ACCESS TO POLICY DATA ON BLOCKCHAINMarch 2024March 2025Allow1300YesNo
18592069SYSTEMS AND METHODS FOR ACCELERATED REMEDIATIONS OF CYBERSECURITY ALERTS AND CYBERSECURITY EVENTS IN A CYBERSECURITY EVENT DETECTION AND RESPONSE PLATFORMFebruary 2024January 2025Allow1100YesNo
18444928Cloud Data Security Posture Detection Based On Network Communication Paths And Sensitivity DataFebruary 2024February 2025Allow1200YesNo
18442946TECHNIQUES FOR GENERATING SIGNATURES CHARACTERIZING ADVANCED APPLICATION LAYER FLOOD ATTACK TOOLSFebruary 2024November 2024Allow900YesNo
18412556IDENTIFYING FRAUDULENT REQUESTS FOR CONTENTJanuary 2024November 2024Allow1000YesNo
18411495SYSTEMS AND METHODS FOR CONTROLLED ACCESS TO BLOCKCHAIN DATAJanuary 2024October 2024Allow900YesNo
18396393SYSTEMS AND METHODS FOR USING A NETWORK ACCESS DEVICE TO SECURE A NETWORK PRIOR TO REQUESTING ACCESS TO THE NETWORK BY THE NETWORK ACCESS DEVICEDecember 2023October 2024Allow900YesNo
18545330SYSTEMS AND METHODS FOR DETECTING KEYBOARD CHARACTERISTICSDecember 2023July 2024Allow700YesNo
18492714DETECTING ANOMALOUS DOWNLOADSOctober 2023May 2025Allow1910YesNo
18469721METHOD FOR DETECTING AND ANALYZING TIME-SERIES DATA BASED ON CYBER THREAT FRAMEWORKSeptember 2023May 2025Allow2000YesNo
18369394MICROSERVICES ANOMALY DETECTIONSeptember 2023April 2025Allow1900YesNo
18466261METHODS FOR AUTHENTICATION AND KEY MANAGEMENT IN A WIRELESS COMMUNICATIONS NETWORK AND RELATED APPARATUSESSeptember 2023March 2025Allow1820YesNo
18465312SYSTEMS AND METHODS FOR PRIVATE AUTHENTICATION WITH HELPER NETWORKSSeptember 2023July 2024Allow1000YesNo
18456022SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO A BLOCKCHAINAugust 2023November 2024Allow1400YesNo
18225737RAPID DEVELOPMENT OF MALICIOUS CONTENT DETECTORSJuly 2023March 2025Allow2000YesNo
18259648IDENTIFYING COMPUTER SYSTEMS FOR MALWARE INFECTION MITIGATIONJune 2023October 2024Allow1630YesNo
18334637AUTOMATED ALERT DEDUPLICATION OR SUPPRESSION IN DATA PROCESSING SYSTEMS BASED ON RECURRING DATA IDENTIFIERSJune 2023March 2025Allow2100YesNo
18310142EMBEDDED CONTROLLER METHOD FOR PREVENTION OF DENIAL OF SERVICE ATTACKSMay 2023May 2025Allow2400YesNo
18034683METHOD AND SYSTEM FOR COMMUNICATION BETWEEN SERVER AND AUTHENTICATORApril 2023March 2025Allow2300YesNo
18031640METHOD FOR DETECTION OF MALWAREApril 2023March 2025Allow2310YesNo
18131448VERIFICATION METHOD, VERIFICATION APPARATUS, AND STORAGE MEDIUM INCLUDING PROGRAM STORED THEREINApril 2023May 2025Allow2510YesNo
18130167THREAT MITIGATION SYSTEM AND METHODApril 2023October 2024Allow1820YesNo
18130152THREAT MITIGATION SYSTEM AND METHODApril 2023August 2024Allow1620YesNo
18188012SYSTEM AND METHOD FOR DEVICE AUTHENTICATION IN A DISTRIBUTED ENVIRONMENT USING A TWIN INFERENCE MODELMarch 2023April 2025Allow2500YesNo
18146063SELF-CONSISTENT STRUCTURES FOR SECURE TRANSMISSION AND TEMPORARY STORAGE OF SENSITIVE DATADecember 2022May 2025Allow2910YesNo
17977066SYSTEMS AND METHODS FOR PRIVATE AUTHENTICATION WITH HELPER NETWORKSOctober 2022June 2025Allow3210YesNo
17946595Method and Apparatus for Providing Isolated Asset Access in a Layered Security SystemSeptember 2022March 2025Allow3010YesNo
17882429USER ACTIVITY-TRIGGERED URL SCANAugust 2022December 2024Allow2810YesNo
17858910SYSTEMS AND TECHNIQUES FOR AUTHENTICATION AND SECURITYJuly 2022February 2025Allow3120YesNo
17781237DETECTING DEVICE, TAMPER DETECTING SYSTEM, CENTRAL SERVER, PARTICIPANT SERVER, TAMPER DETECTING METHOD, AND PROGRAMMay 2022December 2024Abandon3010YesNo
17664920COLLECTING ENDPOINT DATA AND NETWORK DATA TO DETECT AN ANOMALYMay 2022January 2025Allow3220YesNo
17736111SYSTEM AND METHOD FOR SOCIAL NETWORK ANALYSISMay 2022February 2025Allow3410YesNo
17704068Security Compatibility Testing and Configuration PlatformMarch 2022May 2025Allow3830YesNo
17583687SYSTEM AND METHODS FOR IMPLEMENTING PRIVATE IDENTITYJanuary 2022February 2025Allow3710YesNo

Appeals Overview

No appeal data available for this record. This may indicate that no appeals have been filed or decided for applications in this dataset.

Examiner CHAMPAKESAN, BADRI NARAYANAN - Prosecution Strategy Guide

Executive Summary

Examiner CHAMPAKESAN, BADRI NARAYANAN works in Art Unit 2494 and has examined 28 patent applications in our dataset. With an allowance rate of 96.4%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 23 months.

Allowance Patterns

Examiner CHAMPAKESAN, BADRI NARAYANAN's allowance rate of 96.4% places them in the 89% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.

Office Action Patterns

On average, applications examined by CHAMPAKESAN, BADRI NARAYANAN receive 0.93 office actions before reaching final disposition. This places the examiner in the 10% percentile for office actions issued. This examiner issues significantly fewer office actions than most examiners.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by CHAMPAKESAN, BADRI NARAYANAN is 23 months. This places the examiner in the 75% percentile for prosecution speed. Applications move through prosecution relatively quickly with this examiner.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 45.0% of applications are subsequently allowed. This success rate is in the 95% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 50.0% of cases where such amendments are filed. This entry rate is in the 70% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.

Petition Practice

When applicants file petitions regarding this examiner's actions, 0.0% are granted (fully or in part). This grant rate is in the 2% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 15% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 20% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • RCEs are effective: This examiner has a high allowance rate after RCE compared to others. If you receive a final rejection and have substantive amendments or arguments, an RCE is likely to be successful.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.