Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18627058 | SHARING DATA IN AN ORGANIZED STORAGE SYSTEM | April 2024 | January 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18409315 | DATA ACCESS CONTROL FOR USER DEVICES USING A BLOCKCHAIN | January 2024 | June 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18407834 | ORGANIZED DATA STORAGE SYSTEM | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18228361 | SYSTEMS AND/OR METHODS IMPLEMENTING HYBRID APPROACH USING JWT TOKEN AND SYMMETRIC HASHING | July 2023 | April 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18226116 | PKI-BASED USER AUTHENTICATION FOR WEB SERVICES USING BLOCKCHAIN | July 2023 | February 2025 | Allow | 19 | 2 | 0 | Yes | No |
| 18220143 | ENCRYPTION MECHANISM USED IN MULTI-BAND CHANNEL ACCESS | July 2023 | September 2024 | Allow | 14 | 1 | 0 | Yes | No |
| 18200983 | Caching content securely within an edge environment | May 2023 | April 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18032801 | FUNCTIONAL ENCRYPTION FOR QUADRATIC FUNCTIONS | April 2023 | March 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18171924 | SYSTEMS AND METHODS FOR SECURITY STATE OPTIMIZATION OF SPDM-ENABLED DEVICES | February 2023 | April 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18159038 | IDENTIFYING SUSPICIOUS ENTRIES IN A DOCUMENT MANAGEMENT SYSTEM | January 2023 | February 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18059841 | DISAMBIGUATION AND AUTHENTICATION OF DEVICE USERS | November 2022 | June 2025 | Abandon | 31 | 2 | 0 | No | No |
| 18052087 | TECHNOLOGIES FOR ESTABLISHING SECURE CHANNEL BETWEEN I/O SUBSYSTEM AND TRUSTED APPLICATION FOR SECURE I/O DATA TRANSFER | November 2022 | December 2024 | Abandon | 26 | 2 | 0 | No | No |
| 18050838 | CONDUCTING MULTI-PARTY AUTHENTICATION IN A PRIVACY PRESERVING MANNER | October 2022 | June 2025 | Allow | 32 | 1 | 0 | Yes | No |
| 17997141 | METHOD AND SYSTEM FOR SELECTIVE AND PRIVACY-PRESERVING ANONYMIZATION | October 2022 | September 2024 | Allow | 23 | 0 | 0 | Yes | No |
| 17959016 | METHODS, SYSTEMS, AND PROCEDURES FOR QUANTUM SECURE ECOSYSTEMS | October 2022 | August 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17936409 | System and Method for creating a digital fingerprint library | September 2022 | April 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17907212 | SYSTEM AND METHOD FOR AUTOMATED SENSITIVE INFORMATION DISCOVERY, MONITORING AND REMEDIATION | September 2022 | January 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 17949895 | System and Methods for Agentless Managed Device Identification as Part of Setting a Security Policy for a Device | September 2022 | December 2024 | Allow | 27 | 0 | 0 | Yes | No |
| 17930818 | BOT PREVENTION VELOCITY FRAMEWORK | September 2022 | April 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 17900721 | SECURING CONTAINERIZED APPLICATIONS | August 2022 | August 2023 | Allow | 12 | 0 | 0 | Yes | No |
| 17904175 | DATA MANAGEMENT SYSTEM | August 2022 | November 2024 | Allow | 27 | 0 | 0 | Yes | No |
| 17879915 | SYSTEM AND METHOD FOR SLICE VIRTUAL DISK ENCRYPTION | August 2022 | September 2023 | Allow | 14 | 0 | 0 | Yes | No |
| 17816111 | SUPER-COOKIE IDENTIFICATION FOR STOLEN COOKIE DETECTION | July 2022 | October 2024 | Allow | 27 | 0 | 0 | Yes | No |
| 17793752 | PERSONAL DATA CHOICE MANAGEMENT PLATFORM | July 2022 | May 2025 | Allow | 34 | 2 | 0 | Yes | No |
| 17867099 | Event visualization device for generating hierarchical directed acyclic graph and related computer program product | July 2022 | May 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17792357 | FRAUD RESISTANT PASSCODE ENTRY SYSTEM | July 2022 | April 2025 | Allow | 33 | 1 | 0 | Yes | No |
| 17810794 | Multi-Factor Authentication with Increased Security | July 2022 | February 2024 | Allow | 19 | 1 | 0 | Yes | No |
| 17810393 | CASCADED KEY DELEGATION SYSTEM FOR SHARING A DIGITAL KEY ASSOCIATED WITH A VEHICLE | July 2022 | September 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17807234 | ALLOW LIST OF CONTAINER IMAGES BASED ON DEPLOYMENT CONFIGURATION AT A CONTAINER ORCHESTRATION SERVICE | June 2022 | March 2025 | Allow | 33 | 2 | 0 | Yes | No |
| 17664258 | ENFORCING POLICIES FOR UNMANAGED APPLICATIONS | May 2022 | February 2025 | Allow | 33 | 2 | 0 | Yes | No |
| 17662803 | APPARATUS AND METHOD FOR HARDWARE-BASED DATA ENCRYPTION WITH IMPEDANCE SWITCH | May 2022 | March 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17726976 | VIDEO-BASED PRIVACY SUPPORTING SYSTEM | April 2022 | December 2024 | Abandon | 32 | 2 | 0 | No | No |
| 17717093 | COMPRESSION OF HOMOMORPHIC CIPHERTEXTS | April 2022 | August 2024 | Allow | 28 | 1 | 0 | No | No |
| 17716907 | CROSS-BLOCKCHAIN DATA PROCESSING METHOD AND APPARATUS, DEVICE, AND COMPUTER STORAGE MEDIUM | April 2022 | February 2025 | Allow | 34 | 2 | 0 | Yes | No |
| 17700009 | TOKEN MANAGEMENT SYSTEMS AND METHODS | March 2022 | December 2024 | Allow | 33 | 3 | 0 | Yes | No |
| 17696221 | SYSTEM AND METHOD FOR INTELLIGENT VALIDATION OF COMMUNICATIONS INITIATED BY INTERNET OF THINGS DEVICES | March 2022 | January 2025 | Allow | 34 | 1 | 0 | Yes | No |
| 17682397 | RUN-TIME CODE EXECUTION VALIDATION | February 2022 | July 2023 | Allow | 16 | 0 | 0 | Yes | No |
| 17671448 | VERGENCE AUTHENTICATION | February 2022 | July 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17587903 | SYSTEM AND METHOD FOR FLEXIBLE POST-QUANTUM TRUST PROVISIONING AND UPDATING | January 2022 | September 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17578292 | HIERARCHICAL HARDWARE-SOFTWARE PARTITIONING AND CONFIGURATION | January 2022 | November 2024 | Allow | 34 | 2 | 0 | Yes | No |
| 17566806 | CUSTOMIZED ANOMALY DETECTION IN SANDBOX SOFTWARE SECURITY SYSTEMS USING GRAPH CONVOLUTIONAL NETWORKS | December 2021 | September 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17556468 | HYBRID CLOUD SECURITY GROUPS | December 2021 | March 2025 | Allow | 39 | 2 | 0 | Yes | No |
| 17506516 | IDENTITY TIME MACHINE | October 2021 | February 2025 | Allow | 40 | 3 | 0 | Yes | No |
| 17494813 | SHARING DATA IN AN ORGANIZED STORAGE SYSTEM | October 2021 | August 2023 | Allow | 23 | 0 | 0 | Yes | No |
| 17494812 | SHARING DATA IN AN ORGANIZED STORAGE SYSTEM | October 2021 | January 2024 | Allow | 27 | 2 | 0 | Yes | No |
| 17449857 | DATA ACCESS CONTROL FOR USER DEVICES USING A BLOCKCHAIN | October 2021 | November 2023 | Allow | 25 | 0 | 0 | Yes | No |
| 17492662 | ORGANIZED DATA STORAGE SYSTEM | October 2021 | November 2023 | Allow | 25 | 2 | 0 | Yes | No |
| 17492664 | Organized Data Storage System | October 2021 | October 2023 | Allow | 24 | 1 | 0 | Yes | No |
| 17492670 | ORGANIZED DATA STORAGE SYSTEM | October 2021 | August 2023 | Allow | 22 | 1 | 0 | Yes | No |
| 17492671 | ORGANIZED DATA STORAGE SYSTEM | October 2021 | October 2023 | Allow | 25 | 1 | 0 | Yes | No |
| 17491907 | DATA MANAGEMENT SYSTEM | October 2021 | March 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17483756 | SHARING DATA IN AN ORGANIZED STORAGE SYSTEM | September 2021 | August 2022 | Allow | 11 | 2 | 0 | Yes | No |
| 17483754 | ORGANIZED DATA STORAGE SYSTEM | September 2021 | February 2023 | Allow | 17 | 3 | 0 | Yes | No |
| 17479931 | Information Verification Method, Apparatus, And Device | September 2021 | October 2024 | Allow | 37 | 2 | 0 | Yes | No |
| 17465311 | RESTRICTING USAGE OF ENCRYPTION KEYS BY UNTRUSTED SOFTWARE | September 2021 | February 2024 | Allow | 29 | 2 | 0 | Yes | No |
| 17460760 | SYSTEMS AND METHODS RELATING TO DIGITAL IDENTITIES | August 2021 | October 2023 | Allow | 26 | 1 | 0 | No | No |
| 17392127 | METHODS AND APPARATUS TO VALIDATE AND RESTORE MACHINE CONFIGURATIONS | August 2021 | January 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17383242 | SYSTEMS AND METHODS FOR ACCESS CONTROL | July 2021 | July 2024 | Allow | 36 | 2 | 0 | Yes | No |
| 17362974 | METHODS AND APPARATUSES FOR PROCESSING TRANSACTIONS BASED ON BLOCKCHAIN INTEGRATED STATION | June 2021 | January 2022 | Allow | 7 | 1 | 0 | Yes | No |
| 17336193 | SYSTEMS AND METHODS FOR DISTORTING CAPTCHA IMAGES WITH GENERATIVE ADVERSARIAL NETWORKS | June 2021 | September 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17334485 | SECURING CONTAINERIZED APPLICATIONS | May 2021 | June 2022 | Allow | 12 | 2 | 0 | Yes | No |
| 17236233 | DETECTING ATTACKS USING HANDSHAKE REQUESTS SYSTEMS AND METHODS | April 2021 | September 2024 | Allow | 41 | 4 | 0 | Yes | No |
| 17234362 | IDENTIFYING SUSPICIOUS ENTRIES IN A DOCUMENT MANAGEMENT SYSTEM | April 2021 | December 2022 | Allow | 20 | 4 | 0 | Yes | No |
| 17195285 | IDENTIFYING COPYRIGHTED MATERIAL USING EMBEDDED COPYRIGHT INFORMATION | March 2021 | May 2021 | Allow | 2 | 0 | 0 | Yes | No |
| 17195130 | SYSTEMS, METHODS, AND MEDIA FOR IDENTIFYING AND RESPONDING TO MALICIOUS FILES HAVING SIMILAR FEATURES | March 2021 | January 2024 | Allow | 34 | 2 | 0 | Yes | No |
| 17190831 | HYBRID NETWORK INTRUSION DETECTION SYSTEM FOR IOT ATTACKS | March 2021 | May 2021 | Allow | 3 | 0 | 0 | Yes | No |
| 17158137 | Caching content securely within an edge environment, with pre-positioning | January 2021 | January 2023 | Allow | 24 | 0 | 0 | Yes | No |
| 17157654 | Caching content securely within an edge environment | January 2021 | January 2023 | Allow | 23 | 0 | 0 | Yes | No |
| 17146417 | RISK ANALYZER FOR ASCERTAINING A RISK OF HARM TO A NETWORK AND GENERATING ALERTS REGARDING THE ASCERTAINED RISK | January 2021 | October 2023 | Allow | 34 | 3 | 0 | Yes | No |
| 17145022 | INFORMATION PROCESSING APPARATUS AND METHOD OF UPDATING UPDATE PROGRAM | January 2021 | May 2024 | Abandon | 40 | 2 | 0 | No | No |
| 17143655 | DELEGATED AUTHORIZATION FOR ISOLATED COLLECTIONS | January 2021 | April 2024 | Allow | 39 | 2 | 0 | Yes | No |
| 17089801 | Multi-Cloud Framework for Data Protection Using Threshold-Based File Reconstruction | November 2020 | October 2024 | Allow | 47 | 4 | 0 | Yes | No |
| 17068361 | PKI-BASED USER AUTHENTICATION FOR WEB SERVICES USING BLOCKCHAIN | October 2020 | March 2023 | Allow | 29 | 0 | 0 | Yes | No |
| 17021750 | APPARATUSES FOR IMPROVED ELECTRONIC DATA STORAGE AND TRANSFER AND COMPUTER-IMPLEMENTED METHODS OF USING THE SAME | September 2020 | November 2023 | Allow | 38 | 2 | 0 | Yes | No |
| 17006096 | VIDEO-BASED PRIVACY SUPPORTING SYSTEM | August 2020 | December 2023 | Abandon | 40 | 2 | 0 | No | No |
| 17003103 | MEMORY WRITE ACCESS CONTROL | August 2020 | March 2024 | Allow | 43 | 4 | 0 | Yes | No |
| 17002697 | SYSTEMS AND METHODS FOR ACCESS CONTROL | August 2020 | May 2021 | Allow | 9 | 1 | 0 | Yes | No |
| 16947938 | Hybrid password formed by an online website which programmatically creates a base password and combines said base password with a secondary password or personal identification number (PIN) entered by the account owner, and together said base password and said user entered password or PIN forms said hybrid password, whose total identity is not known to either said online website nor said account owner | August 2020 | March 2024 | Abandon | 46 | 4 | 0 | No | No |
| 16999383 | OPCODELESS COMPUTING AND MULTI-PATH ENCRYPTION SYSTEMS, METHODS, AND DEVICES | August 2020 | August 2023 | Allow | 35 | 6 | 0 | Yes | No |
| 16985954 | SECURITY POLICY ANALYZER SERVICE AND SATISFIABILITY ENGINE | August 2020 | November 2022 | Allow | 27 | 0 | 0 | Yes | No |
| 16944460 | GENERATING META-NOTABLE EVENT SUMMARY INFORMATION | July 2020 | April 2023 | Allow | 32 | 1 | 0 | Yes | No |
| 16941326 | MITIGATING COMMUNICATION RISK BY VERIFYING A SENDER OF A MESSAGE | July 2020 | April 2024 | Allow | 44 | 3 | 0 | Yes | No |
| 16865829 | Information Security Using Velocity Attack Detection | May 2020 | September 2022 | Allow | 28 | 0 | 0 | Yes | No |
| 16864443 | DISAMBIGUATION AND AUTHENTICATION OF DEVICE USERS | May 2020 | September 2022 | Allow | 28 | 0 | 0 | Yes | No |
| 16841208 | LIGHTWEIGHT MITIGATION AGAINST FIRST-ORDER PROBING SIDE-CHANNEL ATTACKS ON BLOCK CIPHERS | April 2020 | October 2021 | Abandon | 18 | 1 | 0 | No | No |
| 16818887 | DATA TRANSCEIVING OPERATIONS AND DEVICES | March 2020 | March 2021 | Allow | 12 | 2 | 0 | Yes | No |
| 16780532 | MULTI-FACTOR AUTHENTICATION ENABLED MEMORY SUB-SYSTEM | February 2020 | August 2024 | Abandon | 55 | 4 | 0 | Yes | No |
| 16751852 | SYSTEMS AND METHODS EVALUATING PASSWORD COMPLEXITY AND STRENGTH | January 2020 | August 2021 | Abandon | 19 | 2 | 0 | Yes | No |
| 16725522 | FULL FEATURED PACKET-BASED AUTOMOTIVE NETWORK SECURITY GATEWAY | December 2019 | January 2024 | Abandon | 49 | 3 | 0 | Yes | No |
| 16723903 | TOKEN MANAGEMENT SYSTEMS AND METHODS | December 2019 | November 2021 | Allow | 23 | 1 | 0 | Yes | No |
| 16714232 | IDENTIFYING COPYRIGHTED MATERIAL USING EMBEDDED COPYRIGHT INFORMATION | December 2019 | January 2021 | Allow | 13 | 2 | 0 | Yes | No |
| 16684780 | Generating and Managing a Composite Identity Token for Multi-Service Use | November 2019 | August 2022 | Allow | 33 | 2 | 0 | Yes | No |
| 16683391 | AUTOMATIC PROVISIONING OF KEY MATERIAL ROTATION INFORMATION TO SERVICES | November 2019 | June 2022 | Allow | 31 | 1 | 0 | Yes | No |
| 16675439 | SYSTEMS AND METHODS FOR DISTORTING CAPTCHA IMAGES WITH GENERATIVE ADVERSARIAL NETWORKS | November 2019 | February 2021 | Allow | 16 | 1 | 0 | Yes | No |
| 16661198 | CENTRALIZED VOLUME ENCRYPTION KEY MANAGEMENT FOR EDGE DEVICES WITH TRUSTED PLATFORM MODULES | October 2019 | February 2023 | Allow | 40 | 2 | 0 | Yes | No |
| 16498827 | HIERARCHICAL TEMPORAL MEMORY FOR ACCESS CONTROL | September 2019 | October 2022 | Allow | 37 | 2 | 0 | Yes | No |
| 16564282 | MEMORY ACCESS TRANSACTION WITH SECURITY CHECK INDICATION | September 2019 | April 2023 | Allow | 43 | 2 | 0 | Yes | No |
| 16551964 | TRUSTED EXECUTION ENVIRONMENT VERIFICATION OF A SOFTWARE PACKAGE | August 2019 | July 2022 | Allow | 35 | 2 | 0 | Yes | No |
| 16539643 | ELLIPTIC CURVE CRYPTOGRAPHY SCHEME WITH SIMPLE SIDE-CHANNEL ATTACK COUNTERMEASURE | August 2019 | May 2021 | Allow | 21 | 1 | 0 | No | No |
| 16527716 | System and Method for Slice Virtual Disk Encryption | July 2019 | June 2022 | Allow | 34 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LOUIE, HOWARD H.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 100.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner LOUIE, HOWARD H works in Art Unit 2494 and has examined 197 patent applications in our dataset. With an allowance rate of 84.8%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 32 months.
Examiner LOUIE, HOWARD H's allowance rate of 84.8% places them in the 55% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by LOUIE, HOWARD H receive 1.82 office actions before reaching final disposition. This places the examiner in the 56% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by LOUIE, HOWARD H is 32 months. This places the examiner in the 32% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +52.7% benefit to allowance rate for applications examined by LOUIE, HOWARD H. This interview benefit is in the 95% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 39.4% of applications are subsequently allowed. This success rate is in the 88% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 23.0% of cases where such amendments are filed. This entry rate is in the 22% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 8% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 89% percentile among all examiners. Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 35.7% are granted (fully or in part). This grant rate is in the 31% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 15% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 20% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.