USPTO Examiner TAYLOR SAKINAH W - Art Unit 2497

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18417915METHOD AND SYSTEM FOR SECURING ACCESS TO USER DATA DURING PHISHING DETECTIONJanuary 2024March 2024Allow200YesNo
18401368Blockchain-based Intrusion Detection System for Railway SignalsDecember 2023August 2024Allow710YesNo
18532261POINT-OF-SERVICE DIGITAL IDENTITY VERIFICATION DEVICEDecember 2023August 2024Allow800YesNo
18141973MANAGEMENT OF INTERNET OF THINGS (IOT) BY SECURITY FABRICMay 2023May 2024Allow1210YesNo
18310368SYSTEMS AND METHODS FOR DETECTING AND RESPONDING TO SECURITY THREATS USING APPLICATION EXECUTION AND CONNECTION LINEAGE TRACINGMay 2023September 2024Abandon1610NoNo
18303963METHOD AND SYSTEM FOR ZERO-KNOWLEDGE AND IDENTITY BASED KEY MANAGEMENT FOR DECENTRALIZED APPLICATIONSApril 2023April 2024Allow1200NoNo
18297355SYSTEMS AND METHODS FOR CONTROLLING UNITS FOR A SCALEApril 2023December 2023Allow800YesNo
18111798SYSTEM AND METHOD FOR HANDLING EXCEPTIONS DURING HEALTHCARE RECORD PROCESSINGFebruary 2023October 2023Allow800YesNo
18107172ATTACK SITUATION VISUALIZATION DEVICE, ATTACK SITUATION VISUALIZATION METHOD AND RECORDING MEDIUMFebruary 2023June 2024Allow1620YesNo
18164603DATA SENDING METHOD AND APPARATUS AND DATA RECEIVING METHOD AND APPARATUS FOR RESISTING NETWORK COMMUNICATION MONITORINGFebruary 2023August 2024Allow1800YesNo
18065160DYNAMIC SELF-DEFINED API VIA DIGITAL SIGNATURESDecember 2022July 2024Allow1901NoNo
18077155METHOD FOR DETECTING WEBPAGE SPOOFING ATTACKSDecember 2022February 2024Allow1410NoNo
17972035INJECTABLE HARDWARE AND SOFTWARE ATTESTATION OF SENSORY INPUT DATAOctober 2022January 2024Allow1510YesNo
17970404METHOD AND APPARATUS FOR DETECTING MALWARE VIA ANALYSIS OF A SCREEN CAPTUREOctober 2022January 2024Allow1520YesNo
17963020GUEST ACCESS FOR LOCKING DEVICEOctober 2022February 2024Allow1620NoNo
17952426Dynamically Initiating and Managing Automated Spear Phishing in Enterprise Computing EnvironmentsSeptember 2022December 2023Allow1510NoNo
17942242SYSTEMS AND METHODS FOR AUTOMATICALLY BLOCKING THE USE OF TRACKING TOOLSSeptember 2022November 2023Allow1410NoNo
17859920METHODS AND SYSTEMS FOR SECURE AND RELIABLE IDENTITY-BASED COMPUTINGJuly 2022March 2023Allow800YesNo
17849623SYSTEMS AND METHODS USING SEARCH ENGINES TO GENERATE CRYPTOGRAPHIC KEYS FROM ERRATIC PHYSICAL UNCLONABLE FUNCTIONSJune 2022June 2024Allow2401NoNo
17848556PERVASIVE INTERMEDIATE NETWORK ATTACHED STORAGE APPLICATIONJune 2022September 2023Abandon1410NoNo
17832362SYSTEMS AND METHODS FOR CONTROLLING UNITS FOR A SCALEJune 2022February 2023Allow800YesNo
17738524APPARATUS AND METHOD FOR VERIFYING INTEGRITY OF HARDWARE BOARDMay 2022June 2024Abandon2510NoNo
17715836METHOD FOR DETECTING WEBPAGE SPOOFING ATTACKSApril 2022August 2022Allow500YesNo
17698751SYSTEMS, METHODS, AND MEDIA FOR DEFENDING COMPUTING SYSTEMS FROM ATTACKMarch 2022July 2023Allow1610YesNo
17696057PROVISIONING CONTROL APPARATUS AND METHOD FOR PROVISIONING ELECTRONIC COMPONENTS FOR ELECTRONIC DEVICESMarch 2022June 2024Allow2720YesNo
17654993SELECTIVELY ENCRYPTING COMMIT LOG ENTRIESMarch 2022May 2024Allow2620NoNo
17683443COMPUTER SECURITYMarch 2022July 2024Allow2820YesNo
17671729SYSTEM AND METHOD FOR PROVIDING A SECURE LOCALLY-BASED BOOT DISK ENCRYPTION KEYFebruary 2022April 2024Allow2610NoNo
17672011INTERNET PROTOCOL SECURITY (IPSEC) SECURITY ASSOCIATIONS (SA) BALANCE BETWEEN HETEROGENEOUS CORES IN MULTIPLE CONTROLLER SYSTEMFebruary 2022May 2024Allow2710NoNo
17651030EXTENSIBLE DEVICE HOSTED ROOT OF TRUST ARCHITECTURE FOR INTEGRATED CIRCUITSFebruary 2022August 2023Allow1800NoNo
17666981VERIFICATION OF MESSAGE PATTERNS FOR VEHICLE ECUSFebruary 2022March 2024Allow2500NoNo
17587336DYNAMIC LEARNING SYSTEM FOR INTELLIGENT AUTHENTICATIONJanuary 2022June 2023Allow1610YesNo
17439520METHOD FOR TRANSMITTING DATA PACKETSJanuary 2022June 2023Allow2140YesNo
17648286CONTENT RECORDING AND GROUP ENCRYPTIONJanuary 2022February 2024Allow2520NoNo
17577003PHYSICAL AND NETWORK SECURITY SYSTEM AND METHODSJanuary 2022July 2022Allow610NoNo
17646555Zero Dwell Time Process Library and Script MonitoringDecember 2021May 2024Allow2910YesNo
17550783METHOD AND SYSTEM FOR FACILITATING IDENTIFICATION OF ELECTRONIC DATA EXFILTRATIONDecember 2021January 2024Allow2510NoNo
17542556SYSTEMS AND METHODS FOR PREVENTING INJECTIONS OF MALICIOUS PROCESSES IN SOFTWAREDecember 2021September 2023Allow2110NoNo
17454905SYNTHETIC IDENTITY SIGNAL NETWORKNovember 2021June 2023Allow1910NoNo
17524118NETWORK FORENSIC SYSTEM FOR PERFORMING TRANSMISSION METADATA TRACKING AND ANALYSISNovember 2021February 2023Allow1500NoNo
17490554DETECTING MALWARE BY LINKING BACKGROUND INTELLIGENT TRANSFER SERVICE (BITS) AND SCHEDULED TASK SERVICE (STS) ACTIVITIES TO A SOURCE PROGRAMSeptember 2021March 2023Allow1800YesNo
17447855METHOD AND SYSTEM FOR CAPTURING DATA FROM AN EXTERNAL CLOUD COMPUTING PLATFORMSeptember 2021April 2024Allow3120NoNo
17474121PHISHING DETECTION SYSTEM AND METHOD OF USESeptember 2021July 2024Abandon3410NoNo
17437928INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAMSeptember 2021June 2024Allow3410YesNo
17431197SYSTEM FOR TRUSTED DISTANCE MEASUREMENTAugust 2021April 2024Allow3200YesNo
17444108METHOD FOR WATERMARKING A MACHINE LEARNING MODELJuly 2021March 2024Allow3210NoNo
17387421SYSTEMS AND METHODS FOR AUTOMATICALLY BLOCKING THE USE OF TRACKING TOOLSJuly 2021April 2022Allow910YesNo
17370203RANSOMWARE INFECTION DETECTION IN FILESYSTEMSJuly 2021May 2023Allow2310YesNo
17358381EXTRACTING PROCESS AWARE ANALYTICAL ATTACK GRAPHS THROUGH LOGICAL NETWORK ANALYSISJune 2021September 2023Allow2700YesNo
17329769APPARATUS FOR SELECTING REPRESENTATIVE TOKEN FROM DETECTION NAMES OF MULTIPLE VACCINES, METHOD THEREFOR, AND COMPUTER READABLE RECORDING MEDIUM STORING PROGRAM FOR PERFORMING THE METHODMay 2021September 2021Allow400YesNo
17330313IDENTIFICATION OF INVALID ADVERTISING TRAFFICMay 2021August 2023Allow2700YesNo
17323719INTELLIGENT ORCHESTRATION TO COMBAT DENIAL OF SERVICE ATTACKSMay 2021January 2024Abandon3210NoNo
17242806SYSTEMS AND METHODS FOR AUTOMATED SIMULATED PHISHING CAMPAIGNS USING NEWSLETTERSApril 2021December 2023Abandon3110NoNo
17240254SECURE COMMUNICATION OF PAYLOAD DATAApril 2021April 2024Allow3610NoNo
17230166System, Method, and Computer Program Product for Network Anomaly DetectionApril 2021May 2023Allow2500YesNo
17227720Packet Detection Method and First Network DeviceApril 2021September 2024Abandon4120NoNo
17217985Data Reduction and Evaluation via Link AnalysisMarch 2021October 2023Allow3010YesNo
17213684IDENTIFYING THREAT SIMILARITY USING FORENSICS CLUSTERINGMarch 2021February 2024Allow3520YesNo
17211323METHODS OF MONITORING AND PROTECTING ACCESS TO ONLINE SERVICESMarch 2021November 2023Abandon3220YesNo
17199571MANAGEMENT OF INTERNET OF THINGS (IOT) BY SECURITY FABRICMarch 2021April 2023Allow2510NoNo
17189232PROVIDING SECURITY THROUGH CHARACTERIZING MOBILE TRAFFIC BY DOMAIN NAMESMarch 2021June 2023Allow2710YesNo
17175103Digital Security Violation SystemFebruary 2021May 2023Allow2700NoNo
17267899SYSTEM AND USER PATTERN AUTHENTICATION METHOD FOR PREVENTING SMUDGE AND SHOULDER SURFING ATTACK OF MOBILE DEVICEFebruary 2021July 2024Allow4110NoNo
17266855TRANSITION DISABLE INDICATORFebruary 2021February 2022Allow1200NoNo
17168694DETECTION AND RECOVERY FROM RANSOMWARE INFECTIONSFebruary 2021April 2023Allow2730YesNo
17156869MULTICLASS CLASSIFICATION SYSTEM WITH ACCUMULATOR-BASED ARBITRATIONJanuary 2021July 2023Allow3010YesNo
17147373METHODS AND SYSTEMS FOR SECURE AND RELIABLE IDENTITY-BASED COMPUTINGJanuary 2021April 2022Allow1500YesNo
17147366METHODS AND SYSTEMS FOR SECURE AND RELIABLE IDENTITY-BASED COMPUTINGJanuary 2021April 2022Allow1500YesNo
17126045CORRELATION-BASED SECURITY THREAT ANALYSISDecember 2020August 2023Allow3210YesNo
17121172METHOD FOR DETECTING A WEB SKIMMER ON A "PAYMENT PAGE"December 2020April 2021Allow400YesNo
17116446GRANULAR AND PRIORITIZED VISUALIZATION OF ANOMALOUS LOG DATADecember 2020May 2023Allow2910NoNo
17108193AUTOMATED SOCIAL MEDIA-RELATED BRAND PROTECTIONDecember 2020June 2023Allow3040YesNo
17100042INJECTABLE HARDWARE AND SOFTWARE ATTESTATION OF SENSORY INPUT DATANovember 2020June 2022Allow1800YesNo
17098191SPECTRE FIXES WITH PREDICTOR MODE TAGNovember 2020August 2023Allow3420YesYes
17093995DATA INSPECTION SYSTEM AND METHODNovember 2020April 2023Allow2910NoNo
17078588FILE INTEGRITY MONITORINGOctober 2020May 2023Allow3020YesNo
17064613Detection of cyber machinery attacksOctober 2020April 2022Allow1810NoNo
17063151FILTERING STRATEGIES FOR SUBGRAPH MATCHING ON NOISY MULTIPLEX NETWORKSOctober 2020February 2023Allow2910NoNo
17037892CYBERSECURITY SYSTEMSeptember 2020December 2020Allow200YesNo
17037197DERIVED UNIQUE RECOVERY KEYS PER SESSIONSeptember 2020September 2023Allow3500YesNo
17034241TAILORED NETWORK RISK ANALYSIS USING DEEP LEARNING MODELINGSeptember 2020February 2024Allow4110YesNo
17027753COMPUTER FILE METADATA SEGMENTATION SECURITY SYSTEMSeptember 2020August 2022Allow2230YesNo
17023341Securely Booting a Processor Complex Via a Securely Bootable SubsystemSeptember 2020January 2023Allow2820YesNo
17021542COMPUTATIONAL FRAMEWORK FOR MODELING ADVERSARIAL ACTIVITIESSeptember 2020January 2023Allow2810NoNo
17019219SERVICE ACCESS DATA ENRICHMENT FOR CYBERSECURITYSeptember 2020January 2023Allow2810NoNo
17018916METHOD AND APPARATUS FOR DETECTING MALWARE VIA ANALYSIS OF A SCREEN CAPTURESeptember 2020July 2022Allow2220NoNo
17013310Systems and Methods for Detecting and Responding to Security Threats Using Application Execution and Connection Lineage TracingSeptember 2020January 2023Allow2910YesNo
17011335GUEST ACCESS FOR LOCKING DEVICESeptember 2020June 2022Allow2120NoNo
17005792COUNTING SYN PACKETSAugust 2020March 2023Allow3110NoNo
16994147One-Point Relative Voltage FingerprintingAugust 2020March 2024Allow4320YesNo
16941426UNIQUE ID GENERATION FOR SENSORSJuly 2020February 2023Allow3130YesNo
16962855MONITORING SYSTEM, MONITORING METHOD, AND MONITORING PROGRAMJuly 2020December 2022Abandon2920YesNo
16922232METHOD AND DEVICE FOR INTRUSION DETECTION IN A COMPUTER NETWORKJuly 2020September 2022Allow2610YesNo
16921810PERVASIVE INTERMEDIATE NETWORK ATTACHED STORAGE APPLICATIONJuly 2020March 2022Allow2010NoNo
16918935APPARATUS AND METHODS FOR DETERMINING EVENT INFORMATION AND INTRUSION DETECTION AT A HOST DEVICEJuly 2020March 2023Allow3210NoNo
16904963Fast identification of offense and attack execution in network traffic patternsJune 2020November 2023Allow4120YesYes
16946313TRANSMITTING SENSITIVE INFORMATION SECURELY OVER UNSECURED NETWORKS WITHOUT AUTHENTICATIONJune 2020May 2023Allow3520NoNo
16899020DETERMINING A STATE OF A NETWORKJune 2020August 2023Allow3821NoNo
16946185METHOD AND SYSTEM FOR PROVIDING VALIDATED, AUDITABLE, AND IMMUTABLE INPUTS TO A SMART CONTRACTJune 2020May 2022Allow2320YesNo
16887882SYSTEM AND METHOD FOR MANAGING THE SECURITY HEALTH OF A NETWORK DEVICEMay 2020April 2023Allow3420YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner TAYLOR, SAKINAH W.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
2
Examiner Affirmed
0
(0.0%)
Examiner Reversed
2
(100.0%)
Reversal Percentile
93.6%
Higher than average

What This Means

With a 100.0% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.

Strategic Value of Filing an Appeal

Total Appeal Filings
21
Allowed After Appeal Filing
17
(81.0%)
Not Allowed After Appeal Filing
4
(19.0%)
Filing Benefit Percentile
94.8%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 81.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner TAYLOR, SAKINAH W - Prosecution Strategy Guide

Executive Summary

Examiner TAYLOR, SAKINAH W works in Art Unit 2497 and has examined 324 patent applications in our dataset. With an allowance rate of 86.4%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 30 months.

Allowance Patterns

Examiner TAYLOR, SAKINAH W's allowance rate of 86.4% places them in the 59% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by TAYLOR, SAKINAH W receive 1.77 office actions before reaching final disposition. This places the examiner in the 53% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by TAYLOR, SAKINAH W is 30 months. This places the examiner in the 41% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +21.5% benefit to allowance rate for applications examined by TAYLOR, SAKINAH W. This interview benefit is in the 70% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 31.9% of applications are subsequently allowed. This success rate is in the 58% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 47.7% of cases where such amendments are filed. This entry rate is in the 67% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 30.8% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 30% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 90.9% of appeals filed. This is in the 81% percentile among all examiners. Of these withdrawals, 40.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.

Petition Practice

When applicants file petitions regarding this examiner's actions, 32.6% are granted (fully or in part). This grant rate is in the 25% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 16% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 21% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Appeal filing as negotiation tool: This examiner frequently reconsiders rejections during the appeal process. Filing a Notice of Appeal may prompt favorable reconsideration during the mandatory appeal conference.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.