USPTO Examiner POWERS WILLIAM S - Art Unit 2496

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19108933METHOD OF UTILIZING PHYSICAL OBJECTS IN A BLOCKCHAINMarch 2025January 2026Allow1010YesNo
18748821ACCESS CONTROL LISTS RULES REDUCTIONJune 2024June 2025Allow1210YesNo
18747969Identification of Command Injection AttacksJune 2024June 2025Allow1210YesNo
18680661SYSTEM AND METHOD FOR CONTROLLING AKMA APPLICATION KEYS FOR ROAMING MOBILE DEVICESMay 2024March 2026Allow2220NoNo
18673003DATA ENCRYPTION FOR DATA TRANSFERS BETWEEN SEMICONDUCTOR DIES USING A KEYSTREAM GENERATORMay 2024March 2026Allow2210NoNo
18673057SYSTEM AND METHOD FOR ANALYZING VULNERABILITY IN SOFTWARE INSTALLED ON IOT DEVICEMay 2024November 2024Allow610NoNo
18673066SYSTEM AND METHOD FOR ANLAYZING VULNERABILITY IN IOT DEVICES THROUGH PREPROCESSING IDENTIFICATION INFORMATION OF CONTAMINATION PATHSMay 2024January 2026Allow2010NoNo
18673062SYSTEM AND METHOD FOR ANALYZING CONTAMINATION PATHS TO ANALYZE VULNERABILITIES IN IOT DEVICESMay 2024January 2026Allow2010NoNo
18442457CRYPTOGRAPHIC DATA PROCESSING USING A DMA ENGINEFebruary 2024April 2025Allow1410NoNo
18439138SYSTEM TO MANAGE PRIVACY PREFERENCESFebruary 2024March 2026Allow2520YesNo
18421779SECURED POSITION AWARE CONTINUOUS AUTHENTICATION MESH NETWORKJanuary 2024November 2025Allow2210YesNo
18405804MOBILE DEVICE INTERFACEJanuary 2024June 2025Allow1810NoNo
18403436SLICE-BASED SECURITY PROTOCOL SELECTION FOR INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM (IMS)January 2024October 2025Allow2110NoNo
18543902AUTOMATIC SIGN-IN UPON ACCOUNT SIGNUPDecember 2023December 2024Allow1210NoNo
18540242METHOD AND DEVICE FOR PROTECTING SENSITIVE USER PLANE TRAFFICDecember 2023October 2024Allow1010NoNo
18535512SYSTEM AND METHOD OF PRIVACY-AWARE INTER-CHANNEL COMMUNICATION BETWEEN A BUSINESS ENTITY AND A PERSONDecember 2023August 2025Allow2000NoNo
18529558Issuing Delegate Credentials for Accessing Target ResourcesDecember 2023March 2026Allow2710YesNo
18527493CROSS-CHAIN RESOURCE TRANSFER USING RESOURCE TRANSFER CERTIFICATEDecember 2023August 2025Allow2000NoNo
18389026Methods and Systems for Efficient Encrypted SNI Filtering for Cybersecurity ApplicationsNovember 2023November 2024Allow1210NoNo
18494287SECURITY LIFECYCLE MANAGEMENT OF DEVICES IN A COMMUNICATIONS NETWORKOctober 2023August 2024Allow1010NoNo
18491643SECURE ZERO TOUCH PROVISIONING OF NETWORK DEVICES USING BLUETOOTH APPLICATIONOctober 2023January 2026Allow2720YesNo
18555227MAGNETIC PORT COVERS FOR COMPUTING DEVICESOctober 2023February 2026Abandon2810NoNo
18373465METHODS FOR GENERATING AN ACTION BASED ON TLS PARAMETERS AND DEVICES THEREOFSeptember 2023February 2026Allow2920NoNo
18369070VIRTUALIZING SECURE VAULT OF DATA PROCESSING UNIT FOR SECURE HARDWARE SECURITY MODULE FOR HOSTSSeptember 2023October 2025Allow2510NoNo
18460913IIoT CROSS-DOMAIN AUTHENTICATION USING IDENTITY FEDERATED SMART CONTRACTSSeptember 2023October 2025Allow2610NoNo
18234238SYSTEM AND METHOD FOR LOCATION-BASED ACCESS CONTROLAugust 2023November 2024Allow1510NoNo
18226074ONLINE COMMAND INJECTION ATTACKS IDENTIFICATIONJuly 2023March 2024Allow810NoNo
18222887SYSTEM AND METHOD FOR PERFORMING REMOTE SECURITY ASSESSMENT OF FIREWALLED COMPUTERJuly 2023June 2024Allow1110NoNo
18347385Attestation Of A Cloud-Based Execution Environment For Project PlanningJuly 2023March 2026Allow3240NoNo
18341450Wireless Earpieces for Hub CommunicationsJune 2023April 2024Allow1010NoNo
18339571PLATFORM SECURITY MECHANISMJune 2023July 2025Abandon2540YesNo
18202329NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM STORING PROGRAM AND METHODMay 2023January 2026Allow3110NoNo
18142858SYSTEMS AND METHODS FOR AIDA BASED EXPLOIT SELECTIONMay 2023June 2024Allow1320NoNo
18311149SYSTEMS AND METHODS FOR SIMULTANEOUS MULTIFACTOR AUTHENTICATIONMay 2023September 2025Allow2810YesNo
18309722CRYPTOGRAPHIC PROCESS FOR PORTABLE DEVICES, AND USER PRESENCE AND/OR ACCESS AUTHORIZATION SYSTEM AND METHOD EMPLOYING SAMEApril 2023July 2024Abandon1510NoNo
18303901ACCESS TO DATA BROADCAST IN ENCRYPTED FORM BASED ON BLOCKCHAINApril 2023February 2024Allow1010NoNo
18031183RELAY UE AND REMOTE UE AUTHORIZATIONApril 2023July 2025Allow2710NoNo
18119823METHOD FOR PROVIDING DEVICE SHARING SERVICE IN ISOLATION ENVIRONMENT AND SERVER PERFORMING THE SAMEMarch 2023February 2026Abandon3520NoNo
18114955SYSTEMS AND METHODS FOR HYBRID BLOCKCHAIN CONTROLFebruary 2023October 2023Allow810NoNo
18167744Function Call Authentication for Program Flow ControlFebruary 2023September 2025Allow3210YesNo
18165724PRIVACY PROTECTING TRANSACTION ENGINE FOR A CLOUD PROVIDER NETWORKFebruary 2023March 2024Allow1310NoNo
18056723INFORMATION SECURITY EARLY WARNING DEVICE AND METHOD THEREOFNovember 2022October 2025Abandon3510NoNo
18045929PASSWORD-LESS WIRELESS AUTHENTICATIONOctober 2022April 2024Allow1830NoNo
17958538SYSTEM TO TERMINATE MALICIOUS PROCESS IN A DATA CENTEROctober 2022September 2025Abandon3610NoNo
17958794SYSTEM AND METHOD FOR SECURE CODE SCANNINGOctober 2022February 2026Abandon4140NoNo
17953177MOBILE DEVICE INTERFACESeptember 2022August 2023Allow1110NoNo
17913889REPRESENTATION TOKENS IN INDIRECT COMMUNICATIONSeptember 2022September 2025Abandon3610NoNo
17911830METHOD AND DEVICE FOR PROTECTING SENSITIVE USER PLANE TRAFFICSeptember 2022September 2023Allow1220NoNo
17939602MANAGING COMPOSITE TOKENS FOR CONTENT ACCESS REQUESTSSeptember 2022February 2025Allow3000NoNo
17908083Method and device for detecting the use of an uncertified domain name serverAugust 2022February 2026Allow4130YesNo
17890682PRIVACY ARRANGEMENT FOR DIRECTIONAL DATAAugust 2022February 2025Allow3010YesNo
17889858METHOD AND APPARATUS FOR CONTROLLING COMPUTING ASSETS WITHIN A ZERO-TRUST ARCHITECTUREAugust 2022February 2024Allow1800NoNo
17904210IMPROVED PACKET TRANSFERAugust 2022September 2025Allow3730YesNo
17886862ELECTRONIC SYSTEM FOR SECURITY ANALYSIS AND VALIDATION DURING CONSTRUCTION AND DEPLOYMENT OF DYNAMIC NETWORK COMPONENTSAugust 2022August 2024Allow2400NoNo
17818264MUTUAL AUTHENTICATION FOR RELIABLE CONFIGURATION RECEPTION OVER REFERENCE SIGNALSAugust 2022June 2024Allow2200NoNo
17880385IDENTIFYING SECURITY EVENTS IN PROGRAMMING CODE FOR LOGGINGAugust 2022January 2025Allow3010NoNo
17863414BLOCKCHAIN-BASED PRIVACY PROTECTION METHOD FOR CONTENT CENTRIC NETWORK (CCN)July 2022June 2024Allow2400NoNo
17863487NETWORKING DEVICE CREDENTIAL INFORMATION RESET SYSTEMJuly 2022September 2024Allow2710YesNo
17863140DETECTING IDENTITY SPOOFING ATTACKS IN MULTI-SENSOR SYSTEMS AND APPLICATIONSJuly 2022June 2025Allow3540YesNo
17849406METHOD AND APPARATUS FOR DETECTING ABNORMAL ROAMING REQUESTJune 2022August 2024Abandon2610NoNo
17783920Apparatus and Methods for Encrypted CommunicationJune 2022October 2025Allow4030NoNo
17783644METHOD AND SYSTEM FOR MANAGING IMPERSONATED, FORGED/TAMPERED EMAILJune 2022March 2026Abandon4550YesNo
17783301RENDERING OF UNSAFE WEBPAGESJune 2022January 2025Abandon3120YesNo
17783077ACCESS CONTROL APPARATUS, CONTROL METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUMJune 2022October 2024Allow2810NoNo
17830181ACCESS CONTROL LISTS RULES REDUCTIONJune 2022March 2024Allow2200NoNo
17735409SYSTEMS AND METHODS FOR OFFLINE USAGE OF SAAS APPLICATIONSMay 2022September 2024Allow2910YesNo
17730674Method and System for Enabling Drive Features Using Secure CertificatesApril 2022September 2024Abandon2810NoNo
17713837SECURE AUDIO PLAYBACKApril 2022January 2025Abandon3420YesNo
17765032SERVER NODE, DIGITAL ASSISTANT AND METHODS IN A COMMUNICATIONS NETWORK FOR HANDLING ACCESS CONTROLMarch 2022October 2025Abandon4350NoNo
17700281CERTIFICATE AUTHORITY SELECTION IN A CLOUD PROVIDER NETWORKMarch 2022August 2024Allow2910NoNo
17680098INFORMATION PROCESSING APPARATUS AND CONTROL METHOD FOR INFORMATION PROCESSING APPARATUSFebruary 2022December 2024Allow3420NoNo
17679969METHOD, APPARATUS, ELECTRONIC DEVICE, AND MEDIUM FOR DATA TRANSFERFebruary 2022August 2024Allow2920YesNo
17677231CROWDSOURCED BAYESIAN PACKET ANALYSIS FOR DETECTING ANOMALIES IN NETWORK PACKET HEADER DATA ASSOCIATED WITH A USER'S SMART DEVICEFebruary 2022July 2024Allow2910NoNo
17563436Integrated authentication and authorization for cloud data lakesDecember 2021March 2025Allow3920YesNo
17644107RULE-BASED TARGETED EXTRACTION AND ENCRYPTION OF SENSITIVE DOCUMENT FEATURESDecember 2021February 2026Abandon5020YesYes
17617414Provision of Application Level IdentityDecember 2021June 2024Allow3010NoNo
17595089LIVE USER AUTHENTICATION DEVICE, SYSTEM AND METHOD AND FRAUD OR COLLUSION PREVENTION USING SAMENovember 2021July 2024Abandon3210NoNo
17502328SECURITY DEVICE TO PROTECT UNUSED COMMUNICATION PORTSOctober 2021February 2025Abandon4040YesNo
17502334SECURITY DEVICE TO PROTECT ACTIVE COMMUNICATION PORTSOctober 2021July 2024Allow3310YesNo
17603590Method to Authenticate a User at a Service ProviderOctober 2021April 2024Allow3020NoNo
17476990ATTRIBUTION OF USER DATA SOURCES ACROSS DATASETS IN A DATA SHARING PLATFORMSeptember 2021March 2024Allow3010YesNo
17463493AUTOMATIC SIGN-IN UPON ACCOUNT SIGNUPAugust 2021November 2023Allow2700NoNo
17459178THRESHOLD MULTI-PARTY COMPUTATION WITH MUST-HAVE MEMBERAugust 2021December 2023Allow2700NoNo
17403995IDENTIFYING CREDENTIAL ATTACKS ON ENCRYPTED NETWORK TRAFFICAugust 2021February 2024Allow3010YesNo
17387823ANALYZING HARDWARE DESIGNS FOR VULNERABILITIES TO SIDE-CHANNEL ATTACKSJuly 2021December 2023Allow2910YesNo
17355691PROXY SERVICES FOR CONTROLLING THE PERSISTENCY, UTILIZATION, & DISSEMINATION OF INFORMATION PROVIDED TO A SERVICE WORKERJune 2021October 2023Allow2710YesNo
17304124MEMORY SYSTEM AND METHOD OF MANAGING ENCRYPTION KEYJune 2021July 2025Allow4940NoNo
17309530DETECTING VULNERABILITY CHANGE IN SOFTWARE SYSTEMSJune 2021January 2024Allow3110NoNo
17309529DETECTING VULNERABLE SOFTWARE SYSTEMSJune 2021February 2024Allow3210NoNo
17309531REMEDIATING SOFTWARE VULNERABILITIESJune 2021January 2024Allow3210NoNo
17291872PROTECTION METHOD AND PROTECTION DEVICE UNDER DIRECT ROUTING MODEMay 2021March 2024Abandon3410NoNo
17285455AUTHENTICATION-PERMISSION SYSTEM, INFORMATION PROCESSING APPARATUS, EQUIPMENT, AUTHENTICATION-PERMISSION METHOD AND PROGRAMApril 2021April 2025Allow4840YesNo
17215745METHOD FOR PROVIDING WIRELESS APPLICATION PRIVILEGE MANAGEMENTMarch 2021December 2023Allow3260YesNo
17262719Control TerminalJanuary 2021August 2025Abandon5420NoYes
17250128Method for registering of data as a digital file in a blockchain databaseDecember 2020November 2023Allow3510YesNo
17090052INFORMATION PROCESSING APPARATUS, METHOD FOR ENSURING FILES AND STORAGE MEDIUMNovember 2020October 2025Abandon5960YesNo
17032391ONE-TOUCH INLINE CRYPTOGRAPHIC DATA PROCESSINGSeptember 2020November 2023Allow3800NoNo
16779899PROTECTING PERSONAL DATA AND CONTROLLING A DISTRIBUTION OF PERSONAL DATA ACQUIRED BY A POOL CLEANING ROBOTFebruary 2020July 2024Abandon5320NoYes
16340440MOBILE INFORMATION TERMINAL AND METHOD FOR CONTROLLING SAMEApril 2019March 2025Abandon6070YesNo
16004798REVOKING CREDENTIALS AFTER SERVICE ACCESSJune 2018October 2023Allow6060NoYes

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner POWERS, WILLIAM S.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
5
Examiner Affirmed
5
(100.0%)
Examiner Reversed
0
(0.0%)
Reversal Percentile
7.6%
Lower than average

What This Means

With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
6
Allowed After Appeal Filing
0
(0.0%)
Not Allowed After Appeal Filing
6
(100.0%)
Filing Benefit Percentile
4.1%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 0.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner POWERS, WILLIAM S - Prosecution Strategy Guide

Executive Summary

Examiner POWERS, WILLIAM S works in Art Unit 2496 and has examined 76 patent applications in our dataset. With an allowance rate of 89.5%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 38 months.

Allowance Patterns

Examiner POWERS, WILLIAM S's allowance rate of 89.5% places them in the 72% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by POWERS, WILLIAM S receive 2.11 office actions before reaching final disposition. This places the examiner in the 56% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by POWERS, WILLIAM S is 38 months. This places the examiner in the 30% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +1.1% benefit to allowance rate for applications examined by POWERS, WILLIAM S. This interview benefit is in the 19% percentile among all examiners. Note: Interviews show limited statistical benefit with this examiner compared to others, though they may still be valuable for clarifying issues.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 21.3% of applications are subsequently allowed. This success rate is in the 25% percentile among all examiners. Strategic Insight: RCEs show lower effectiveness with this examiner compared to others. Consider whether a continuation application might be more strategic, especially if you need to add new matter or significantly broaden claims.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 27.8% of cases where such amendments are filed. This entry rate is in the 39% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 9% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 37.5% of appeals filed. This is in the 6% percentile among all examiners. Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.

Petition Practice

When applicants file petitions regarding this examiner's actions, 40.0% are granted (fully or in part). This grant rate is in the 30% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 14.5% of allowed cases (in the 96% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 23% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Examiner cooperation: This examiner frequently makes examiner's amendments to place applications in condition for allowance. If you are close to allowance, the examiner may help finalize the claims.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.