Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18917690 | SYSTEM AND METHOD FOR DETERMINING CODE REACHABILITY IN A NETWORKED COMPUTING ENVIRONMENT | October 2024 | January 2025 | Allow | 3 | 1 | 0 | No | No |
| 18770575 | CRYPTOGRAPHIC KEY MANAGEMENT AND TRANSFER | July 2024 | February 2025 | Allow | 8 | 1 | 0 | Yes | No |
| 18637064 | SYSTEM AND METHOD FOR DISTRIBUTION OF KEY GENERATION DATA IN A SECURE NETWORK | April 2024 | January 2025 | Allow | 9 | 1 | 0 | No | No |
| 18537864 | SYSTEM AND METHOD FOR DOCUMENT SECURITY THAT CAN BE USED IN A VOTE PROCESS | December 2023 | June 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18513407 | INDIVIDUAL DATA UNIT AND METHODS AND SYSTEMS FOR ENHANCING THE SECURITY OF USER DATA | November 2023 | February 2025 | Allow | 15 | 1 | 0 | No | No |
| 18498108 | INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM | October 2023 | June 2025 | Allow | 20 | 2 | 0 | Yes | No |
| 18497353 | METHOD AND SYSTEM FOR MODULATED WAVEFORM ENCRYPTION | October 2023 | May 2025 | Abandon | 19 | 1 | 0 | No | No |
| 18491415 | SYSTEM AND METHOD FOR DISTRIBUTION OF KEY GENERATION DATA IN A SECURE NETWORK | October 2023 | January 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18486037 | CRYPTOGRAPHIC SYSTEMS AND METHODS FOR PROVIDING SERVICES TO AUTHENTICATED USERS | October 2023 | June 2024 | Allow | 9 | 1 | 1 | Yes | No |
| 18376547 | STATELESS SYSTEM TO PROTECT DATA | October 2023 | February 2025 | Allow | 17 | 2 | 0 | Yes | No |
| 18451155 | WHITELISTING CLIENTS ACCESSING RESOURCES VIA A SECURE WEB GATEWAY WITH TIME-BASED ONE TIME PASSWORDS FOR AUTHENTICATION | August 2023 | March 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18273447 | A SYSTEM AND METHOD FOR TRUSTLESS KEY PROVISIONING | July 2023 | February 2025 | Allow | 19 | 0 | 0 | No | No |
| 18211519 | SYSTEMS AND METHODS FOR DETECTION OF SESSION TAMPERING AND FRAUD PREVENTION | June 2023 | May 2024 | Allow | 11 | 1 | 0 | No | No |
| 18209367 | DATA ACCESS POLICIES | June 2023 | March 2025 | Allow | 21 | 2 | 0 | Yes | No |
| 18208541 | ADDITIVE FRIEND SUGGESTION FOR ACCOUNT SECURITY | June 2023 | March 2025 | Allow | 21 | 2 | 0 | Yes | No |
| 18256275 | DATA PROCESSING METHOD AND APPARATUS, COMPUTER DEVICE AND COMPUTER STORAGE MEDIUM | June 2023 | April 2025 | Allow | 22 | 0 | 0 | No | No |
| 18330410 | QUANTUM SAFE KEY EXCHANGE SCHEME | June 2023 | November 2024 | Allow | 17 | 1 | 0 | Yes | No |
| 18306219 | METHODS AND SYSTEMS FOR FACILITATING JOINT SUBMISSIONS | April 2023 | May 2024 | Allow | 13 | 1 | 0 | No | No |
| 18136177 | SECRET MATERIAL EXCHANGE AND AUTHENTICATION CRYPTOGRAPHY OPERATIONS | April 2023 | September 2024 | Allow | 17 | 1 | 0 | No | No |
| 18030436 | DECENTRALIZED MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION | April 2023 | January 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18130440 | End-to-end encryption based on a simple shared secret | April 2023 | October 2023 | Allow | 7 | 0 | 0 | No | No |
| 18124326 | INTEGRATION OF IDENTITY ACCESS MANAGEMENT INFRASTRUCTURE WITH ZERO-KNOWLEDGE SERVICES | March 2023 | June 2025 | Allow | 27 | 1 | 0 | No | No |
| 18184451 | PROTECTION OF A SECRET KEY | March 2023 | April 2025 | Allow | 25 | 0 | 0 | No | No |
| 18024262 | MEMORY PROTECTION FOR VECTOR OPERATIONS | March 2023 | February 2025 | Allow | 23 | 0 | 0 | No | No |
| 18168725 | METHOD FOR CRYPTOGRAPHIC SIGNATURE OF A DATUM, ASSOCIATED ELECTRONIC DEVICE AND ASSOCIATED COMPUTER PROGRAM | February 2023 | October 2024 | Allow | 20 | 0 | 0 | No | No |
| 18163485 | CRYPTOGRAPHIC SYSTEM, ENCRYPTION DEVICE, DECRYPTION DEVICE, AND KEY GENERATION DEVICE | February 2023 | April 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18102842 | SYSTEMS AND METHODS FOR TOKENIZATION TO SUPPORT PSEUDONYMIZATION OF SENSITVE DATA | January 2023 | April 2025 | Allow | 27 | 3 | 0 | No | No |
| 18161535 | WIRELESS NETWORK POLICY MANAGER FOR A SERVICE MESH | January 2023 | April 2025 | Allow | 26 | 1 | 0 | No | No |
| 18156607 | SYSTEMS AND METHODS FOR FEDERATED MODEL VALIDATION AND DATA VERIFICATION | January 2023 | April 2025 | Allow | 27 | 1 | 0 | No | No |
| 18087799 | Systems and Methods for Efficiently Serving Blockchain Requests Using an Optimized Cache | December 2022 | March 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 18069547 | ENCRYPTION CIRCUIT RANDOMNESS INSPECTOR AND METHOD | December 2022 | August 2023 | Allow | 8 | 1 | 1 | No | No |
| 18078944 | INDIVIDUAL DATA UNIT AND METHODS AND SYSTEMS FOR ENHANCING THE SECURITY OF USER DATA | December 2022 | August 2023 | Allow | 8 | 1 | 0 | No | No |
| 17803824 | Fingerprinted software | December 2022 | August 2023 | Allow | 8 | 2 | 0 | Yes | No |
| 18076634 | Identity Management for Web2 and Web3 Environments | December 2022 | March 2025 | Allow | 27 | 0 | 1 | No | No |
| 17993931 | End-to-end encryption based on a simple shared secret | November 2022 | November 2023 | Abandon | 11 | 1 | 0 | No | No |
| 18051655 | END-TO-END DISTRIBUTED RECOVERY OF A USER COMPUTING DEVICE ON WHICH SECURE WORKSPACES ARE DEPLOYED | November 2022 | May 2025 | Allow | 30 | 2 | 0 | No | No |
| 17975576 | DATA SENSITIVITY CLASSIFICATION USING CONTENT-BASED DATASETS | October 2022 | June 2025 | Allow | 31 | 2 | 0 | No | No |
| 17970017 | Cryptographic Operation | October 2022 | July 2023 | Allow | 9 | 2 | 0 | No | No |
| 17965854 | KEY ROTATION SERVICE | October 2022 | September 2024 | Allow | 23 | 1 | 0 | No | No |
| 17964797 | CYBER SECURITY USING ONE OR MORE MODELS TRAINED ON A NORMAL BEHAVIOR | October 2022 | September 2024 | Allow | 23 | 4 | 0 | Yes | No |
| 17936878 | PHISHING DETECTION USING HTML | September 2022 | August 2024 | Allow | 22 | 0 | 0 | No | No |
| 17955304 | PASSWORD BASED THRESHOLD TOKEN GENERATION | September 2022 | March 2023 | Allow | 6 | 1 | 0 | No | No |
| 17933198 | ENCRYPTION CIRCUIT RANDOMNESS INSPECTOR AND METHOD | September 2022 | May 2023 | Allow | 8 | 1 | 0 | No | No |
| 17947151 | METHOD AND SYSTEM FOR COMMUNICATING A SECRET | September 2022 | February 2024 | Allow | 16 | 2 | 0 | No | No |
| 17930436 | METHODS AND SYSTEMS FOR FACILITATING JOINT SUBMISSIONS | September 2022 | January 2023 | Allow | 4 | 1 | 0 | No | No |
| 17898433 | SYSTEM AND METHOD FOR IMPROVED SECURITY IN ADVANCED METERING INFRASTRUCTURE NETWORKS | August 2022 | June 2024 | Allow | 22 | 1 | 0 | No | No |
| 17821979 | Random Number Generator | August 2022 | May 2023 | Allow | 8 | 1 | 0 | No | No |
| 17820236 | ELECTRONIC SUBSCRIBER IDENTITY MODULE TRANSFER CREDENTIAL WRAPPING | August 2022 | April 2023 | Allow | 8 | 1 | 0 | No | No |
| 17798741 | METHOD FOR EDGE COMPUTING--BASED DECENTRALIZED OF INTRUSION AND ANOMALIES | August 2022 | November 2024 | Allow | 27 | 1 | 0 | No | No |
| 17818164 | CRYPTOGRAPHIC VALIDATION OF MEDIA INTEGRITY | August 2022 | October 2023 | Allow | 14 | 1 | 0 | Yes | No |
| 17877508 | COMPLIANT NODE IDENTIFICATION | July 2022 | July 2024 | Allow | 23 | 0 | 0 | No | No |
| 17863181 | COMPUTER IMPLEMENTED METHODS, APPARATUSES AND SOFTWARE FOR RANDOM NUMBER GENERATION BASED ON GENETIC INFORMATION | July 2022 | July 2023 | Allow | 12 | 1 | 0 | No | No |
| 17807643 | STORING DECRYPTED BODY OF MESSAGE AND KEY USED TO ENCRYPT AND DECRYPT BODY OF MESSAGE | June 2022 | July 2023 | Allow | 13 | 2 | 0 | Yes | No |
| 17832666 | STATELESS SYSTEM TO PROTECT DATA | June 2022 | December 2022 | Allow | 6 | 0 | 0 | No | No |
| 17832671 | STATELESS SYSTEM TO PROTECT DATA | June 2022 | July 2023 | Allow | 13 | 2 | 0 | Yes | No |
| 17832630 | STATELESS SYSTEM TO PROTECT DATA | June 2022 | August 2022 | Allow | 2 | 0 | 0 | No | No |
| 17781955 | METHODS AND APPARATUS FOR DETECTING MALICIOUS RE-TRAINING OF AN ANOMALY DETECTION SYSTEM | June 2022 | April 2024 | Allow | 23 | 0 | 0 | No | No |
| 17750902 | REGISTRATION DEVICE, SEARCH OPERATION DEVICE, AND DATA MANAGEMENT DEVICE | May 2022 | September 2023 | Allow | 16 | 0 | 1 | Yes | No |
| 17732009 | MULTI-TIER TOKENIZATION WITH LONG TERM TOKEN | April 2022 | April 2024 | Allow | 24 | 0 | 0 | No | No |
| 17730138 | DATA SET INCLUDING A SECURE KEY | April 2022 | February 2023 | Allow | 10 | 1 | 0 | No | No |
| 17700064 | Key Distribution Method, Key Receiving Method, First Key Management System, and First Network Element | March 2022 | February 2023 | Allow | 11 | 1 | 0 | No | No |
| 17668809 | NETWORK LAYER SIGNALING SECURITY WITH NEXT GENERATION FIREWALL | February 2022 | July 2023 | Allow | 17 | 1 | 1 | No | No |
| 17669195 | DIAMETER SECURITY WITH NEXT GENERATION FIREWALL | February 2022 | July 2023 | Allow | 17 | 1 | 1 | No | No |
| 17668336 | APPLICATION LAYER SIGNALING SECURITY WITH NEXT GENERATION FIREWALL | February 2022 | July 2023 | Allow | 17 | 1 | 1 | No | No |
| 17582392 | SYSTEM AND METHOD FOR SECURELY TRANSFERRING DATA USING ENCRYPTION KEYS | January 2022 | November 2024 | Allow | 34 | 1 | 0 | No | No |
| 17576844 | TRANSPORT LAYER SIGNALING SECURITY WITH NEXT GENERATION FIREWALL | January 2022 | February 2023 | Allow | 13 | 1 | 0 | No | No |
| 17572646 | APPARATUS AND METHOD FOR AUTHENTICATING NETWORK VIDEO RECORDER SECURITY | January 2022 | June 2023 | Allow | 17 | 0 | 0 | No | No |
| 17647557 | SHARED SECRET DATA PRODUCTION WITH USE OF CONCEALED CLOAKING ELEMENTS | January 2022 | January 2023 | Allow | 13 | 1 | 0 | No | No |
| 17428405 | ENCRYPTION AND DECRYPTION METHOD AND DEVICE BASED ON BIT PERMUTATION AND BIT TRANSFORMATION | January 2022 | May 2023 | Allow | 22 | 0 | 0 | Yes | No |
| 17549739 | DEPLOYING, SECURING, AND ACCESSING ENCRYPTION KEYS | December 2021 | June 2023 | Allow | 18 | 0 | 0 | No | No |
| 17534531 | Cryptographic Key Storage System and Method | November 2021 | September 2023 | Allow | 22 | 0 | 0 | No | No |
| 17531055 | INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM | November 2021 | August 2023 | Allow | 21 | 2 | 0 | No | No |
| 17523551 | PUF BASED KEY GENERATION FOR LATTICE AND CODE CRYPTOGRAPHY | November 2021 | May 2024 | Allow | 31 | 0 | 1 | No | No |
| 17521620 | ADDITIVE FRIEND SUGGESTION FOR ACCOUNT SECURITY | November 2021 | January 2023 | Allow | 15 | 1 | 0 | Yes | No |
| 17518416 | SYSTEMS AND METHODS FOR DETECTION OF SESSION TAMPERING AND FRAUD PREVENTION | November 2021 | April 2023 | Allow | 17 | 1 | 0 | No | No |
| 17515616 | DATA ACCESS POLICIES | November 2021 | April 2023 | Allow | 17 | 1 | 0 | No | No |
| 17606434 | DPA-RESISTANT KEY DERIVATION FUNCTION | October 2021 | December 2023 | Allow | 25 | 1 | 0 | No | No |
| 17509607 | METHODS AND SYSTEMS IMPLEMENTED IN A NETWORK ARCHITECTURE WITH NODES CAPABLE OF PERFORMING MESSAGE-BASED TRANSACTIONS | October 2021 | August 2024 | Abandon | 34 | 1 | 1 | No | No |
| 17505509 | SEQUENCE ENCRYPTION FOR REFACTORING RECONSTRUCTED-KEY | October 2021 | October 2024 | Abandon | 36 | 3 | 0 | No | No |
| 17450607 | METHOD AND DEVICE FOR SECURE CODE EXECUTION FROM EXTERNAL MEMORY | October 2021 | January 2023 | Allow | 16 | 0 | 0 | No | No |
| 17497886 | SHARING GROUPED DATA IN AN ORGANIZED STORAGE SYSTEM | October 2021 | December 2022 | Allow | 14 | 1 | 0 | Yes | No |
| 17497885 | SHARING GROUPED DATA IN AN ORGANIZED STORAGE SYSTEM | October 2021 | October 2022 | Allow | 13 | 1 | 0 | Yes | No |
| 17601205 | EFFICIENT SIDE-CHANNEL-ATTACK-RESISTANT MEMORY ENCRYPTOR BASED ON KEY UPDATE | October 2021 | August 2023 | Allow | 22 | 2 | 0 | No | No |
| 17485405 | SHARING GROUPED DATA IN AN ORGANIZED STORAGE SYSTEM | September 2021 | February 2022 | Allow | 5 | 1 | 0 | Yes | No |
| 17477383 | PRIVACY-PRESERVING MULTI-TOUCH ATTRIBUTION | September 2021 | November 2023 | Allow | 26 | 1 | 0 | Yes | No |
| 17474082 | FRAMEWORK FOR VALIDATING AND TROUBLESHOOTING NETWORK POLICY CONFIGURATIONS | September 2021 | January 2024 | Allow | 28 | 0 | 0 | No | No |
| 17436030 | CRYPTOGRAPHIC SYSTEMS | September 2021 | December 2024 | Abandon | 39 | 2 | 1 | Yes | No |
| 17434143 | A METHOD FOR PROVIDING A DIGITAL SIGNATURE TO A MESSAGE | August 2021 | May 2023 | Allow | 20 | 0 | 0 | No | No |
| 17398299 | SYSTEM AND METHOD FOR EVOLVING CRYPTOGRAPHY WITH A PRIVATE TIME BASE | August 2021 | April 2024 | Abandon | 32 | 1 | 1 | No | No |
| 17395413 | SYSTEMS AND METHODS FOR SECURE MULTI-PARTY COMMUNICATIONS USING A PROXY | August 2021 | March 2024 | Allow | 31 | 0 | 0 | No | No |
| 17389692 | MACHINE LEARNING MODEL FOR CALCULATING CONFIDENCE SCORES ASSOCIATED WITH POTENTIAL SECURITY VULNERABILITIES | July 2021 | July 2024 | Allow | 36 | 1 | 0 | No | No |
| 17381580 | PROVIDING A CHALLENGE TO A DEVICE | July 2021 | June 2024 | Allow | 35 | 4 | 0 | Yes | No |
| 17380149 | ROLLOVER OF ENCRYPTION KEYS IN A PACKET-COMPATIBLE NETWORK | July 2021 | December 2022 | Allow | 17 | 1 | 0 | No | No |
| 17363569 | REPORTING AND PROCESSING CONTROLLER SECURITY INFORMATION | June 2021 | November 2022 | Allow | 17 | 1 | 0 | No | No |
| 17362697 | Fork-Tolerant Consensus Protocol | June 2021 | August 2024 | Allow | 37 | 1 | 0 | No | No |
| 17359581 | CONSENSUS METHOD OF CONSORTIUM BLOCKCHAIN, AND CONSORTIUM BLOCKCHAIN SYSTEM | June 2021 | February 2022 | Allow | 8 | 1 | 0 | Yes | No |
| 17358473 | CRYPTOGRAPHIC AUTHENTICATION TO CONTROL ACCESS TO STORAGE DEVICES | June 2021 | March 2024 | Allow | 33 | 1 | 0 | Yes | No |
| 17355818 | NOVEL METHOD OF SECURING LEGACY ANALOG SENSOR CIRCUITS USED IN PHYSICAL SECURITY, PREMISE ACCESS CONTROL AND INDUSTRIAL SCADA APPLICATIONS | June 2021 | October 2023 | Abandon | 28 | 2 | 1 | No | No |
| 17344113 | EVOLVING CRYPTOGRAPHY SYSTEM AND METHOD | June 2021 | July 2023 | Allow | 25 | 1 | 0 | No | No |
| 17342271 | BLOCK CIPHER ENCRYPTION FOR PROCESSOR-ACCELERATOR MEMORY MAPPED INPUT/OUTPUT COMMUNICATION | June 2021 | August 2022 | Allow | 14 | 1 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LEWIS, LISA C.
With a 13.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 24.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner LEWIS, LISA C works in Art Unit 2495 and has examined 674 patent applications in our dataset. With an allowance rate of 88.9%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 25 months.
Examiner LEWIS, LISA C's allowance rate of 88.9% places them in the 67% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by LEWIS, LISA C receive 1.68 office actions before reaching final disposition. This places the examiner in the 47% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by LEWIS, LISA C is 25 months. This places the examiner in the 66% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +6.0% benefit to allowance rate for applications examined by LEWIS, LISA C. This interview benefit is in the 33% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 31.2% of applications are subsequently allowed. This success rate is in the 55% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 34.3% of cases where such amendments are filed. This entry rate is in the 43% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 77.4% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 60% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 58.9% of appeals filed. This is in the 28% percentile among all examiners. Of these withdrawals, 57.6% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 43.1% are granted (fully or in part). This grant rate is in the 46% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 0.4% of allowed cases (in the 58% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 1.7% of allowed cases (in the 62% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.