Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18647565 | SYSTEM AND PROCESS FOR PROVIDING NETWORK INTRUSION DETECTION | April 2024 | May 2025 | Allow | 12 | 1 | 0 | No | No |
| 18237155 | SYSTEMS AND METHODS FOR LOGIN ANOMALY DETECTION WITH INTEGRATED FEEDBACK | August 2023 | August 2025 | Allow | 24 | 1 | 0 | Yes | No |
| 18453121 | AUTOMATED WEB TRAFFIC ANOMALY DETECTION | August 2023 | January 2025 | Allow | 17 | 1 | 0 | No | No |
| 18225868 | PREDICTIVELY PROVIDING ACCESS TO RESOURCES | July 2023 | November 2025 | Abandon | 28 | 3 | 0 | Yes | No |
| 18221254 | BOT HUNTING SYSTEM AND METHOD | July 2023 | April 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18325957 | SUPPRESSING VIRUS PROPAGATION IN A LOCAL AREA NETWORK | May 2023 | June 2024 | Allow | 13 | 1 | 0 | No | No |
| 18313917 | DIGITAL SIGNATURES FOR SMALL CELLS OF TELECOMMUNICATIONS NETWORKS | May 2023 | June 2024 | Allow | 14 | 1 | 0 | No | No |
| 18041275 | METHOD FOR TRAINING CREDIT THRESHOLD, METHOD FOR DETECTING IP ADDRESS, COMPUTER DEVICE AND STORAGE MEDIUM | February 2023 | July 2025 | Allow | 30 | 1 | 0 | No | No |
| 18103392 | SYSTEM AND METHOD FOR SECURE ELECTRONIC DOCUMENT EXCHANGE AND EXECUTION OF CONTRACTS VIA A SECURE ELECTRONIC PLATFORM WITH BIOMETRIC ACCESS VERIFICATION | January 2023 | October 2025 | Abandon | 33 | 1 | 0 | No | No |
| 18101006 | DETECTION OF A REWIND ATTACK AGAINST A SECURE ENCLAVE | January 2023 | October 2025 | Abandon | 33 | 1 | 0 | No | No |
| 18005916 | DIVERSITY FOR DETECTION AND CORRECTION OF ADVERSARIAL ATTACKS | January 2023 | August 2025 | Allow | 31 | 1 | 0 | Yes | No |
| 18154053 | SERVICE PROCESSING METHOD, APPARATUS, DEVICE, AND SYSTEM | January 2023 | February 2026 | Abandon | 37 | 2 | 0 | No | No |
| 18092467 | HOMOMORPHIC ENCRYPTION KEY MANAGEMENT | January 2023 | December 2024 | Allow | 23 | 0 | 0 | No | No |
| 18090025 | DYNAMIC ROUTING OF APPLICATION TRAFFIC TO ZTNA CONNECTORS | December 2022 | March 2026 | Allow | 38 | 2 | 0 | Yes | No |
| 18010309 | SYSTEM, METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM FOR AN INTERNET-ENABLED NETWORK RADIO NODE | December 2022 | February 2025 | Allow | 26 | 0 | 1 | No | No |
| 18073003 | SYSTEMS, METHODS, AND APPARATUSES FOR DETERMINING RESOURCE MISAPPROPRIATION BASED ON DISTRIBUTION FREQUENCY IN AN ELECTRONIC NETWORK | December 2022 | January 2026 | Allow | 37 | 3 | 0 | Yes | No |
| 17994589 | Vulnerability Detection At Points of Exposure | November 2022 | August 2025 | Allow | 33 | 4 | 0 | Yes | No |
| 17998078 | DEVICE, SYSTEM AND METHOD FOR THE ENCRYPTED STORAGE OF CLINICAL-SURGICAL DATA | November 2022 | July 2025 | Allow | 32 | 2 | 0 | No | No |
| 17974889 | SYSTEM AND METHOD FOR ELECTRONIC ACCESS CONTROL IN MESH NETWORKED SITES | October 2022 | March 2026 | Allow | 41 | 4 | 1 | No | No |
| 17791907 | SECURE COMPUTATION APPARATUS, SECURE COMPUTATION METHOD, AND PROGRAM | July 2022 | June 2025 | Allow | 35 | 2 | 0 | Yes | No |
| 17791789 | SYSTEMS AND COMPUTER-IMPLEMENTED METHODS FOR GENERATING PSEUDO RANDOM NUMBERS | July 2022 | July 2025 | Allow | 37 | 2 | 0 | Yes | No |
| 17791870 | ENCRYPTION METHOD AND SYSTEM FOR XENOMORPHIC CRYPTOGRAPHY | July 2022 | September 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17804736 | METHOD AND DEVICE FOR BIOMETRIC IDENTIFICATION AND/OR AUTHENTICATION | May 2022 | March 2025 | Allow | 33 | 2 | 0 | Yes | No |
| 17719681 | Zero-Knowledge Proofs for Providing Browsing Data | April 2022 | October 2024 | Abandon | 30 | 1 | 0 | No | No |
| 17719176 | BLOCKCHAIN-BASED MESSAGE PROCESSING METHOD AND APPARATUS, DEVICE, AND STORAGE MEDIUM | April 2022 | August 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17708274 | SYSTEM FOR ADAPTIVE MANAGEMENT OF DOWNSTREAM TECHNOLOGY ELEMENTS | March 2022 | March 2025 | Allow | 35 | 2 | 0 | Yes | No |
| 17754170 | IMPROVEMENTS TO QUANTUM KEY DISTRIBUTION | March 2022 | February 2025 | Allow | 35 | 3 | 0 | No | No |
| 17763361 | MANAGEMENT APPARATUS, NETWORK MONITORING SYSTEM, DETERMINATION METHOD, COMMUNICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | March 2022 | November 2025 | Abandon | 44 | 3 | 0 | No | No |
| 17655231 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY RECORDING MEDIUM | March 2022 | September 2024 | Abandon | 30 | 1 | 0 | No | No |
| 17544699 | TRANSPORT AND CRYPTOGRAPHY OFFLOAD TO A NETWORK INTERFACE DEVICE | December 2021 | July 2025 | Allow | 43 | 2 | 0 | Yes | Yes |
| 17515634 | COMPUTER-READABLE RECORDING MEDIUM STORING INFORMATION PROCESSING PROGRAM, DEVICE, AND METHOD | November 2021 | August 2024 | Abandon | 34 | 1 | 0 | No | No |
| 17400544 | THIRD PARTY CERTIFICATE MANAGEMENT FOR NATIVE AND THIRD PARTY MOBILE APPS | August 2021 | October 2023 | Allow | 26 | 2 | 0 | No | No |
| 17399088 | CREDENTIALS MANAGEMENT AND USAGE IN APPLICATION MODERNIZATION | August 2021 | August 2024 | Allow | 36 | 1 | 0 | No | No |
| 17395677 | SYSTEM AND METHOD FOR DATA ANONYMIZATION USING OPTIMIZATION TECHNIQUES | August 2021 | January 2024 | Allow | 29 | 0 | 0 | Yes | No |
| 17392486 | SYSTEM FOR ACTIVE DETECTION AND MITIGATION OF UNAUTHORIZED ACTIVITY WITHIN A TECHNOLOGY INFRASTRUCTURE | August 2021 | May 2025 | Allow | 46 | 3 | 0 | Yes | No |
| 17414910 | DEVICE AND METHOD FOR PROTECTING A MEMORY | June 2021 | March 2024 | Allow | 33 | 1 | 0 | No | No |
| 17303906 | METHOD FOR PARTITIONING A PLURALITY OF DEVICES IN A COMMUNICATIONS SYSTEM AND A DEVICE THEREFOR | June 2021 | April 2024 | Allow | 35 | 3 | 0 | Yes | No |
| 17311670 | DEVICES AND METHODS FOR THE DETECTION AND LOCALIZATION OF FAULT INJECTION ATTACKS | June 2021 | November 2023 | Allow | 29 | 0 | 0 | No | No |
| 17317921 | DETECTION METHOD FOR MALICIOUS DOMAIN NAME IN DOMAIN NAME SYSTEM AND DETECTION DEVICE | May 2021 | December 2023 | Allow | 31 | 1 | 0 | No | No |
| 17307646 | AUDITABLE SECURE REVERSE ENGINEERING PROOF MACHINE LEARNING PIPELINE AND METHODS | May 2021 | July 2025 | Abandon | 50 | 2 | 1 | No | No |
| 17224275 | BGP BLACKHOLE AND HIJACK MITIGATION | April 2021 | October 2023 | Allow | 30 | 1 | 0 | Yes | No |
| 17219318 | OPTIMALLY COMPRESSED FEATURE REPRESENTATION DEPLOYMENT FOR AUTOMATED REFRESH IN EVENT DRIVEN LEARNING PARADIGMS | March 2021 | March 2024 | Allow | 36 | 1 | 0 | Yes | No |
| 17211646 | METHODS OF MONITORING AND PROTECTING ACCESS TO ONLINE SERVICES | March 2021 | June 2025 | Allow | 50 | 3 | 0 | Yes | No |
| 17203228 | TECHNIQUES FOR PREVENTING MESSAGING ATTACKS IN CODES | March 2021 | September 2024 | Allow | 42 | 4 | 0 | Yes | No |
| 17188879 | SYSTEM AND METHOD FOR OPERATING SYSTEM DISTRIBUTION AND VERSION IDENTIFICATION USING COMMUNICATIONS SECURITY FINGERPRINTS | March 2021 | March 2025 | Allow | 49 | 4 | 0 | Yes | No |
| 17249323 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM | February 2021 | February 2023 | Allow | 24 | 1 | 0 | Yes | No |
| 17122458 | BOT HUNTING SYSTEM AND METHOD | February 2021 | April 2023 | Allow | 28 | 0 | 0 | Yes | No |
| 17171963 | DYNAMIC SELECTION OF A VPNC GATEWAY BASED ON USER BEHAVIOR | February 2021 | November 2023 | Allow | 33 | 2 | 0 | Yes | No |
| 17168364 | AUTOMATED WEB TRAFFIC ANOMALY DETECTION | February 2021 | March 2023 | Allow | 26 | 0 | 0 | No | No |
| 17264710 | ANALYSIS APPARATUS, ANALYSIS SYSTEM, ANALYSIS METHOD AND PROGRAM | January 2021 | March 2026 | Abandon | 60 | 4 | 0 | Yes | No |
| 17160946 | SYSTEM AND METHOD FOR DETECTION AND DEFLECTION OF ATTACKS ON IN-VEHICLE CONTROLLERS AND NETWORKS | January 2021 | February 2026 | Abandon | 60 | 6 | 0 | No | Yes |
| 17155820 | FIRMWARE COMPONENT IDENTIFICATION AND VULNERABILITY ASSESSMENT | January 2021 | August 2025 | Allow | 54 | 4 | 0 | Yes | No |
| 17151032 | SUPPRESSING VIRUS PROPAGATION IN A LOCAL AREA NETWORK | January 2021 | March 2023 | Allow | 26 | 1 | 0 | No | No |
| 17143635 | SYSTEM AND PROCESS FOR PROVIDING NETWORK INTRUSION DETECTION | January 2021 | June 2024 | Abandon | 42 | 2 | 0 | No | No |
| 17143385 | SYSTEM FOR DETECTING AND REMEDIATING COMPUTING SYSTEM BREACHES USING COMPUTING NETWORK TRAFFIC MONITORING | January 2021 | July 2023 | Allow | 31 | 2 | 0 | No | No |
| 17134967 | DETECTION OF UNAUTHORIZED INTERNET OF THINGS DEVICES IN A COMPUTER NETWORK | December 2020 | April 2025 | Allow | 52 | 5 | 0 | Yes | Yes |
| 17134336 | METHOD AND APPARATUS FOR DETECTING ANOMALIES OF A DNS TRAFFIC | December 2020 | April 2023 | Allow | 28 | 1 | 0 | No | No |
| 17124938 | METHOD OF AUTHENTICATION MANAGEMENT FOR EQUIPMENT IN A DATA COMMUNICATION SYSTEM, AND SYSTEM FOR IMPLEMENTING THE METHOD | December 2020 | July 2024 | Abandon | 43 | 4 | 0 | No | No |
| 17121537 | DIGITAL SIGNATURES FOR SMALL CELLS OF TELECOMMUNICATIONS NETWORKS | December 2020 | February 2023 | Allow | 26 | 0 | 0 | Yes | No |
| 17120004 | BIOMETRIC-BASED IDENTITY AUTHENTICATION | December 2020 | September 2024 | Abandon | 45 | 2 | 0 | No | No |
| 17247356 | SYSTEM AND METHOD FOR DATA FILTERING IN MACHINE LEARNING MODEL TO DETECT IMPERSONATION ATTACKS | December 2020 | November 2025 | Allow | 59 | 6 | 0 | Yes | Yes |
| 17114091 | NETWORK TRAFFIC DISTRIBUTION USING CERTIFICATE SCANNING IN AGENT-BASED ARCHITECTURE | December 2020 | March 2025 | Allow | 51 | 3 | 0 | Yes | No |
| 17111478 | METHODS AND APPARATUS TO ANALYZE TELEMETRY DATA OF A NETWORK DEVICE FOR MALICIOUS ACTIVITY | December 2020 | April 2024 | Allow | 41 | 3 | 0 | Yes | No |
| 17097342 | SYSTEM AND METHOD OF PROCESSING INFORMATION SECURITY EVENTS TO DETECT CYBERATTACKS | November 2020 | February 2023 | Allow | 27 | 1 | 0 | No | No |
| 17075024 | ANOMALY DETECTION USING AN ENSEMBLE OF DETECTION MODELS | October 2020 | November 2024 | Abandon | 48 | 5 | 0 | Yes | No |
| 17068157 | MALWARE DETECTION AND MITIGATION VIA A FORWARD PROXY SERVER | October 2020 | June 2024 | Abandon | 44 | 4 | 0 | Yes | No |
| 17066629 | User-Sourced Object Reputations | October 2020 | June 2025 | Allow | 56 | 6 | 0 | Yes | Yes |
| 17063931 | NETWORK-BASED KERBEROS TICKET FORGERY DETECTION | October 2020 | April 2024 | Allow | 42 | 4 | 0 | Yes | No |
| 16948574 | METHOD, PRODUCT, AND SYSTEM FOR DETECTING MALICIOUS NETWORK ACTIVITY USING A GRAPH MIXTURE DENSITY NEURAL NETWORK | September 2020 | June 2023 | Allow | 32 | 2 | 0 | Yes | No |
| 16977008 | COMMUNICATIONS SYSTEM AND DEVICES FOR ROUTING DATA | August 2020 | October 2024 | Abandon | 50 | 2 | 0 | Yes | No |
| 17003627 | METHODS AND DEVICES FOR DETECTING A SPOOFING ATTACK | August 2020 | November 2022 | Allow | 26 | 0 | 0 | No | No |
| 16921052 | DEVICE AND METHOD FOR INTRUSION DETECTION IN A COMMUNICATIONS NETWORK | July 2020 | June 2024 | Abandon | 47 | 4 | 0 | No | Yes |
| 16920491 | GATEWAY AND PROXY FOR VEHICLE HEAD UNIT CERTIFICATE VALIDATION | July 2020 | February 2024 | Abandon | 43 | 4 | 0 | Yes | No |
| 16912299 | SERVICE TO SERVICE SSH WITH AUTHENTICATION AND SSH SESSION REAUTHENTICATION | June 2020 | May 2024 | Abandon | 47 | 4 | 0 | Yes | No |
| 16909869 | METHOD AND APPARATUS TO DETECT SCRIPTED NETWORK TRAFFIC | June 2020 | January 2023 | Allow | 31 | 1 | 0 | Yes | No |
| 16908073 | METHOD AND SYSTEM FOR ANTIVIRUS SCANNING OF BACKUP DATA AT A CENTRALIZED STORAGE | June 2020 | June 2022 | Allow | 24 | 0 | 0 | No | No |
| 16902707 | Building a Machine Learning model without compromising data privacy | June 2020 | August 2023 | Allow | 38 | 4 | 0 | No | No |
| 16897651 | Dynamic Authentication Control System | June 2020 | May 2024 | Abandon | 47 | 4 | 0 | Yes | No |
| 16856208 | SENSITIVE DATA IDENTIFICATION IN REAL TIME FOR DATA STREAMING | April 2020 | June 2023 | Allow | 38 | 3 | 0 | Yes | No |
| 16837104 | DYNAMIC MANAGEMENT OF USER IDENTIFICATIONS | April 2020 | July 2022 | Allow | 27 | 1 | 0 | No | No |
| 16823273 | DETECTION OF HIGH-RISK BLOBS BASED ON AN ANALYSIS OF ASSOCIATED GRAPHICAL ELEMENTS | March 2020 | January 2023 | Allow | 34 | 1 | 0 | Yes | No |
| 16644739 | METHOD AND DEVICE FOR DETECTING AN ATTACK ON A SERIAL COMMUNICATIONS SYSTEM | March 2020 | October 2022 | Allow | 31 | 1 | 0 | No | No |
| 16723050 | Exposure detection by scan telemetry | December 2019 | September 2022 | Allow | 33 | 1 | 0 | No | No |
| 16618116 | METHOD OF MANAGING ACCOUNT LOGIN INFORMATION | November 2019 | August 2022 | Abandon | 33 | 1 | 0 | No | No |
| 16606462 | KEY ENCRYPTION KEY WRAPPING | October 2019 | March 2023 | Allow | 40 | 2 | 0 | Yes | Yes |
| 16598563 | METHOD AND SYSTEM FOR SIGNING AN ARTIFICIAL INTELLIGENCE WATERMARK USING A KERNEL | October 2019 | August 2022 | Allow | 35 | 1 | 0 | No | No |
| 16584001 | ANOMALY DETECTION INCLUDING PROPERTY CHANGES | September 2019 | April 2024 | Allow | 55 | 6 | 0 | Yes | No |
| 16571363 | PREDICTIVELY PROVIDING ACCESS TO RESOURCES | September 2019 | April 2023 | Allow | 43 | 3 | 0 | Yes | No |
| 16475951 | ELECTRONIC DEVICE FOR PROCESSING VIDEO SIGNAL AND COMPUTER READABLE RECORDING MEDIUM | July 2019 | August 2022 | Allow | 37 | 1 | 0 | No | No |
| 16278635 | UNAUTHORIZED DATA MANIPULATION DETECTION | February 2019 | September 2022 | Allow | 43 | 2 | 0 | No | No |
| 16089184 | Applications, Systems and Methods to Monitor, Filter and/or Alter Output of a Computing Device | September 2018 | September 2023 | Allow | 60 | 3 | 1 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner OLAEGBE, MUDASIRU K.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 71.4% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner OLAEGBE, MUDASIRU K works in Art Unit 2495 and has examined 62 patent applications in our dataset. With an allowance rate of 75.8%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 38 months.
Examiner OLAEGBE, MUDASIRU K's allowance rate of 75.8% places them in the 41% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by OLAEGBE, MUDASIRU K receive 2.35 office actions before reaching final disposition. This places the examiner in the 67% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by OLAEGBE, MUDASIRU K is 38 months. This places the examiner in the 30% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +8.0% benefit to allowance rate for applications examined by OLAEGBE, MUDASIRU K. This interview benefit is in the 38% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 23.7% of applications are subsequently allowed. This success rate is in the 33% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.
This examiner enters after-final amendments leading to allowance in 13.8% of cases where such amendments are filed. This entry rate is in the 14% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 66.7% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 54% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 90% percentile among all examiners. Of these withdrawals, 40.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 23% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.