USPTO Examiner NOAMAN BASSAM A - Art Unit 2497

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19348050METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION USING DIFFERENT POLICY CLASSESOctober 2025January 2026Allow300YesNo
19336798SYSTEMS AND METHODS FOR DATA ENCRYPTION AND DECRYPTION BASED ON RANDOMIZED MATRIX AND ORDERED TRANSFORMATIONSSeptember 2025December 2025Allow300YesNo
19301768SYSTEMS AND METHODS FOR DATA ENCRYPTION AND DECRYPTION BASED ON UNIQUE ENCRYPTION VALUE SETSAugust 2025January 2026Allow500YesNo
19255903PRIVACY-PRESERVING AUTHENTICATED KEY ROTATIONJune 2025August 2025Allow200YesNo
19222615SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATIONMay 2025July 2025Allow200YesNo
19187708ONE-TIME KEY DERIVATIONApril 2025October 2025Allow610YesNo
19080179SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATIONMarch 2025October 2025Allow710YesNo
19038599Systems and Methods for Performing Secure Transactions on BlockchainJanuary 2025August 2025Allow710NoNo
19034297SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATIONJanuary 2025March 2025Allow100YesNo
19012244SYSTEMS AND METHODS USING DNS TUNNELING FOR FAST SYMMETRIC SESSION ENCRYPTION KEY ESTABLISHMENT USING A COMPUTING DEVICEJanuary 2025September 2025Allow800YesNo
18942048VALIDATING PARAMETERS ON DISCRETE COMPUTING APPLICATIONS TO GRANT ACCESS CONTROL TO CONTENT OR COMMANDSNovember 2024February 2026Allow1600YesNo
18806633METHOD FOR DATA PROCESSING, READABLE MEDIUM AND ELECTRONIC DEVICEAugust 2024January 2025Allow610NoNo
18754635METHOD AND APPARATUS FOR IDENTIFYING A FAKE VIDEO CALLJune 2024February 2026Allow2010YesNo
18750590SYSTEMS AND METHODS FOR GENERATING ATTESTED DATAJune 2024November 2024Allow510YesNo
18677365METHOD, ELECTRONIC DEVICE, AND PROGRAM PRODUCT FOR GENERATING TEXT CONTENT FOR MULTI-PARTY COLLABORATIONMay 2024October 2025Allow1600YesNo
18668047COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR SHARING A COMMON SECRETMay 2024September 2025Allow1600YesNo
18666254AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORKMay 2024September 2025Allow1600NoNo
18655171SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATIONMay 2024December 2024Allow720YesNo
18646242Deterministic Crypto-Random Values for Cryptographic OperationsApril 2024October 2025Allow1700YesNo
18596080SECURING SENSITIVE DATA STORED IN AN OBJECT OF A DISTRIBUTED COMPUTING ENVIRONMENTMarch 2024January 2026Allow2210YesNo
18440668SYSTEMS AND METHODS TO ENCRYPT CENTRALIZED INFORMATION ASSOCIATED WITH USERS OF A CUSTOMER DUE DILIGENCE PLATFORM BASED ON A MODIFIED KEY EXPANSION SCHEDULEFebruary 2024July 2025Allow1700YesNo
18396603SYSTEMS AND METHODS FOR ENCRYPTING AND TRANSMITTING DATA BETWEEN DEVICESDecember 2023November 2025Allow2200YesNo
18540943MULTI-PARTY PRIVACY COMPUTING METHOD AND DEVICE BASED ON SEMI-TRUSTED HARDWAREDecember 2023April 2024Allow400YesNo
18534683SYSTEMS AND METHODS FOR VEHICLE ENCRYPTED COMMUNICATION FOR VEHICLE-ROAD-CLOUD COLLABORATIONDecember 2023April 2024Allow410YesNo
18529879INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM FOR PROCESSING REGISTRATION REQUESTSDecember 2023June 2025Allow1900YesNo
18558706RESOURCE DISTRIBUTION METHOD AND APPARATUSNovember 2023September 2025Allow2210NoNo
18557286DATA COMMUNICATION METHOD, APPARATUS, AND SYSTEMOctober 2023July 2024Allow910YesNo
18382427COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR OBTAINING DIGITALLY SIGNED DATAOctober 2023November 2024Allow1300NoNo
18485932AUTOMATION OF USER IDENTITY USING NETWORK PROTOCOL PROVIDING SECURE GRANTING OR REVOCATION OF SECURED ACCESS RIGHTSOctober 2023June 2025Allow2010NoNo
18553932SECURITY ENCRYPTION METHOD FOR COMPUTER FILES, SECURITY DECRYPTION METHOD FOR COMPUTER FILES, AND READABLE STORAGE MEDIUMOctober 2023November 2025Abandon2510NoNo
18283543METHOD OF DATA TRANSMISSION, AND ELECTRONIC DEVICESeptember 2023January 2026Allow2810NoNo
18448815CLOUD-BASED CREATION OF A CUSTOMER-SPECIFIC SYMMETRIC KEY ACTIVATION DATABASEAugust 2023April 2025Allow2020NoNo
18275372THRESHOLD KEY EXCHANGEAugust 2023June 2025Allow2200NoNo
18362452SYSTEMS AND METHODS TO ENCRYPT CENTRALIZED INFORMATION ASSOCIATED WITH USERS OF A CUSTOMER DUE DILIGENCE PLATFORM BASED ON A MODIFIED KEY EXPANSION SCHEDULEJuly 2023November 2023Allow410NoNo
18352914HARDENED KEY DERIVATION IN MULTI-PARTY COMPUTATIONJuly 2023March 2025Allow2020YesNo
18337757VALIDATING PARAMETERS ON DISCRETE COMPUTING APPLICATIONS TO GRANT ACCESS CONTROL TO CONTENT OR COMMANDSJune 2023August 2024Allow1410YesNo
18208631VALUE PREFERENCE CAPTURE FUNNEL AND CODING SYSTEMJune 2023March 2024Allow900YesNo
18331915METHOD AND SYSTEM FOR SECURING CLOUD STORAGE AND DATABASES FROM INSIDER THREATS AND OPTIMIZING PERFORMANCEJune 2023April 2025Allow2330YesNo
18326470NON-CUSTODIAL ENROLLMENT AND RECOVERY OF A SECRETMay 2023February 2025Abandon2020YesNo
18322922MESSAGE AUTHENTICATION SYSTEM INCLUDING A NETWORK DEVICE HAVING SECURITY PROXY SUPPORTMay 2023August 2025Allow2700NoNo
18200211SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATIONMay 2023May 2024Allow1200YesNo
18250935Database Multi-Authentication Method and System, Terminal, and Storage MediumApril 2023April 2024Allow1210YesNo
18302170SYSTEMS AND METHODS FOR REFRESHING ENCRYPTION AND DECRYPTION KEYS AND SIGNATURES FOR A REALTIME PIPEPILINEApril 2023September 2023Allow510YesNo
18177531SECURE KEY EXCHANGE MECHANISM IN A WIRELESS COMMUNICATION SYSTEMMarch 2023July 2023Allow500YesNo
18106302COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR SHARING A COMMON SECRETFebruary 2023February 2024Allow1220YesNo
18161837SYSTEMS AND METHODS FOR IMPLEMENTING A DIGITAL CONTAINERJanuary 2023March 2026Allow3830YesNo
18157347METHOD FOR ENCRYPTING AND DECRYPTING DATA ACROSS DOMAINS BASED ON PRIVACY COMPUTINGJanuary 2023October 2023Allow910YesNo
18091193SYSTEMS AND METHODS FOR ENSURING CORRECT EXECUTION OF COMPUTER PROGRAM USING A MEDIATOR COMPUTER SYSTEMDecember 2022December 2024Allow2340YesNo
18063546SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY COMMUNICATIONS CHANNELSDecember 2022May 2023Allow500YesNo
17932896CONSENSUS FOR A BLOCKCHAIN VALIDATIONSeptember 2022November 2025Allow3830YesNo
17944739Systems and Methods for Distributed, Stateless, and Dynamic Browser Challenge Generation and VerificationSeptember 2022October 2024Allow2540YesNo
17816581DETECTING VULNERABILITIES IN MANAGED CLIENT DEVICESAugust 2022July 2023Allow1210YesNo
17877749ACCESS CONTROL IN MICROSERVICE ARCHITECTURESJuly 2022September 2024Allow2620NoYes
17861626Detecting and Preventing Malware Attacks Using Simulated Analytics and Continuous AuthenticationJuly 2022December 2024Abandon2920YesNo
17854222ACCESS CONTROL IN MICROSERVICE ARCHITECTURESJune 2022September 2024Allow2620NoYes
17849629CENTRALIZED BIOMETRIC USER PROFILE SETUP IN INTERNET GATEWAY DEVICE FOR NETWORK ACCESSJune 2022September 2024Abandon2710YesNo
17786756METHODS AND APPARATUS TO IDENTIFY ABNORMAL BEHAVIOR WITHIN A SET OF INTERNET-OF-THINGS DEVICESJune 2022November 2025Allow4110YesNo
17806725Grinding Resistant Cryptographic Systems and Cryptographic Systems Based on Certified MinersJune 2022July 2025Abandon3710NoNo
17805577POST-QUANTUM CRYPTOGRAPHY RISK MODELINGJune 2022May 2025Abandon3520NoNo
17781464AUTOMATION OF USER IDENTITY USING NETWORK PROTOCOL PROVIDING SECURE GRANTING OR REVOCATION OF SECURED ACCESS RIGHTSJune 2022July 2023Allow1310YesNo
17828160METHOD AND SYSTEM FOR SECURING CLOUD STORAGE AND DATABASES FROM INSIDER THREATS AND OPTIMIZING PERFORMANCEMay 2022March 2023Allow920YesNo
17748592METHOD AND SYSTEM FOR PROTECTION OF CLOUD-BASED INFRASTRUCTUREMay 2022March 2026Allow4640YesNo
17748492Authentication System and Method for Controlling Authentication SystemMay 2022December 2024Allow3020YesNo
17662506Secure Communication Encryption And Decryption Mechanism In A Wireless Communication SystemMay 2022January 2025Allow3340YesNo
17736420DETECTING ANOMALIES IN CODE COMMITSMay 2022July 2025Allow3840YesNo
17728201VALUE PREFERENCE CAPTURE FUNNEL AND CODING SYSTEMApril 2022April 2023Allow1120YesNo
17732558ETHERNET DATA TRANSMISSION CIRCUIT AND SYSTEM AND ETHERNET DATA TRANSMISSION METHODApril 2022February 2025Allow3410NoNo
17726817METHODS AND SYSTEMS FOR ANOMALOUS OPERATION DETECTION ON AN ENTERPRISE SERVERApril 2022July 2025Allow3930YesNo
17660250FRAMEWORK FOR EXPOSING CONTEXT-DRIVEN SERVICES WITHIN A WEB BROWSERApril 2022October 2025Allow4220YesNo
17660164DETECTION OF USER ANOMALIES FOR SOFTWARE AS A SERVICE APPLICATION TRAFFIC WITH HIGH AND LOW VARIANCE FEATURE MODELINGApril 2022January 2026Allow4540YesNo
17720381Remote Browsing Isolation for Resource Sharing Video ConferencingApril 2022March 2025Allow3520NoNo
17708808METHOD AND SYSTEM FOR AUTHENTICATING USERSMarch 2022December 2025Allow4540YesNo
17701736RAPID LAUNCH OF SECURE EXECUTABLES IN A VIRTUALIZED ENVIRONMENTMarch 2022May 2025Abandon3820NoNo
17761712GENERATING PRIME NUMBERSMarch 2022December 2023Abandon2110NoNo
17698431SYSTEMS AND METHODS FOR SELECTIVE DEIDENTIFICATION OF MESSAGES INCLUDING PATIENT INFORMATIONMarch 2022May 2025Abandon3820NoNo
17642397ELECTRONIC MAIL DECRYPTING DEVICE, ELECTRONIC MAIL DECRYPTING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAMMarch 2022August 2024Allow3010YesNo
17685823METHOD, APPARATUS, ELECTRONIC DEVICE, AND MEDIUM FOR DETECTING ABNORMALITY IN NETWORKMarch 2022October 2024Allow3220NoNo
17678961DYNAMIC EVALUATION OF DATA STORE ACCESS PERMISSIONSFebruary 2022November 2024Allow3310YesNo
17677240PREDICTION OF NETWORK VULNERABILITY OF A USER'S NETWORK-CONNECTED SMART DEVICE USING CROWDSOURCED VULNERABILITY PROFILESFebruary 2022April 2025Allow3820YesNo
17676428SYSTEM AND METHOD FOR REGISTRATION OF CARD KEYS FOR MULTIFUNCTION PERIPHERAL OPERATIONFebruary 2022May 2024Allow2710YesNo
17674565SYSTEMS AND METHODS FOR EVALUATING SYSTEM-OF-SYSTEMS FOR CYBER VULNERABILITIESFebruary 2022December 2024Allow3420YesNo
17674118DETERMINISTIC CRYPTOGRAPHY DEIDENTIFICATION WITH GRANULAR DATA DESTRUCTIONFebruary 2022April 2023Allow1430YesNo
17635699SYSTEMS, DEVICES, AND METHODS FOR OBSERVING AND/OR PERFORMING DATA ACCESS COMPLIANCE TO A COMPUTER NETWORKFebruary 2022January 2025Allow3520NoNo
17650885METHOD FOR THE EXECUTION OF A BINARY CODE OF A COMPUTER PROGRAM BY A MICROPROCESSORFebruary 2022August 2024Allow3010NoNo
17650968PERSONAL INFORMATION REDACTION AND VOICE DEIDENTIFICATIONFebruary 2022August 2024Allow3010YesNo
17670488RESPONSE ACTIVITY-BASED SECURITY COVERAGE MANAGEMENTFebruary 2022August 2025Abandon4230YesNo
17634299SECURITY ASSESSMENT APPARATUS, SECURITY ASSESSMENT METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUMFebruary 2022March 2025Abandon3720NoNo
17583150SYSTEMS AND METHODS FOR PROVIDING SIGNATURELESS, CONFIDENTIAL AND AUTHENTICATION OF DATA DURING HANDSHAKE FOR CLASSICAL AND QUANTUM COMPUTING ENVIRONMENTSJanuary 2022March 2025Allow3711YesNo
17576558SYSTEM AND METHOD FOR IMPROVED END-TO-END CYBERSECURITY MACHINE LEARNING AND DEPLOYMENTJanuary 2022November 2023Allow2220YesNo
17647695DATABASE HIERARCHICAL ENCRYPTION FOR HYBRID-CLOUD ENVIRONMENTJanuary 2022March 2025Allow3920NoNo
17564014Systems, Methods and Media for the Creation of a Protective Layer Between an Application and a Cybersecurity RiskDecember 2021September 2024Allow3310YesNo
17557248Systems and Methods for Implementing Transparent End-To-End Network Public-Key EncryptionDecember 2021November 2024Allow3420YesNo
17619321SECURED SPECULATIVE EXECUTION PROCESSORDecember 2021August 2024Allow3320NoNo
17551441VERIFICATION METHOD FOR FAST SOURCE AND PATH EMBEDDED WITH RANDOM AUTHENTICATIONDecember 2021August 2024Allow3210NoNo
17617906DYNAMIC ENCRYPTION/DECRYPTION OF GENOMIC INFORMATIONDecember 2021May 2025Allow4120YesNo
17643009INFERRING CLOUD NETWORK CONNECTIVITY AS A MINIMAL LIST OF FIREWALL RULESDecember 2021July 2025Allow4310YesNo
17616703DICTIONARY-ATTACK-RESISTANT DATABASE ENCRYPTIONDecember 2021July 2023Allow1910NoNo
17536090AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORKNovember 2021June 2024Allow3010YesNo
17536092AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORKNovember 2021December 2023Allow2410YesNo
17536076AUTHENTICATION PROCEDURE IN A VIRTUAL PRIVATE NETWORKNovember 2021April 2023Allow1630YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner NOAMAN, BASSAM A.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
5
Examiner Affirmed
3
(60.0%)
Examiner Reversed
2
(40.0%)
Reversal Percentile
61.9%
Higher than average

What This Means

With a 40.0% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
8
Allowed After Appeal Filing
3
(37.5%)
Not Allowed After Appeal Filing
5
(62.5%)
Filing Benefit Percentile
61.6%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 37.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner NOAMAN, BASSAM A - Prosecution Strategy Guide

Executive Summary

Examiner NOAMAN, BASSAM A works in Art Unit 2497 and has examined 200 patent applications in our dataset. With an allowance rate of 82.0%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 34 months.

Allowance Patterns

Examiner NOAMAN, BASSAM A's allowance rate of 82.0% places them in the 54% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by NOAMAN, BASSAM A receive 2.29 office actions before reaching final disposition. This places the examiner in the 64% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by NOAMAN, BASSAM A is 34 months. This places the examiner in the 43% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +58.8% benefit to allowance rate for applications examined by NOAMAN, BASSAM A. This interview benefit is in the 96% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 32.4% of applications are subsequently allowed. This success rate is in the 68% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 16.3% of cases where such amendments are filed. This entry rate is in the 18% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 9% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 58.3% of appeals filed. This is in the 32% percentile among all examiners. Of these withdrawals, 14.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 58.8% are granted (fully or in part). This grant rate is in the 62% percentile among all examiners. Strategic Note: Petitions show above-average success regarding this examiner's actions. Petitionable matters include restriction requirements (MPEP § 1002.02(c)(2)) and various procedural issues.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 23% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.