Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18413429 | LOCATION VERIFICATION SYSTEM AND METHOD OF VERIFYING A LOCATION OF AN ENTITY | January 2024 | May 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18469647 | PRIVACY SCORE | September 2023 | June 2024 | Allow | 9 | 0 | 0 | No | No |
| 18236533 | URL-BASED AUTHENTICATION FOR PAYMENT CARDS | August 2023 | December 2024 | Allow | 16 | 1 | 0 | Yes | No |
| 18198572 | MULTI-PROCESS COMMUNICATION REGARDING GAMING INFORMATION | May 2023 | September 2024 | Abandon | 16 | 1 | 0 | No | No |
| 18316570 | ADAPTIVE AUTHENTICATION | May 2023 | December 2023 | Allow | 8 | 0 | 0 | Yes | No |
| 18163068 | COMPOSITE BIOMETRIC AUTHENTICATION | February 2023 | December 2023 | Allow | 11 | 1 | 0 | Yes | No |
| 17878781 | ENRICHED DOCUMENT-SENSITIVITY METADATA USING CONTEXTUAL INFORMATION | August 2022 | October 2023 | Allow | 14 | 1 | 0 | Yes | No |
| 17814345 | ACCESS POINT MANAGER FOR ROAMING USER PRODUCTS | July 2022 | January 2024 | Allow | 18 | 3 | 0 | Yes | No |
| 17840723 | RANSOMWARE DETECTION AND MITIGATION | June 2022 | March 2023 | Allow | 9 | 0 | 0 | Yes | No |
| 17835022 | MULTI-PROCESS COMMUNICATION REGARDING GAMING INFORMATION | June 2022 | August 2023 | Abandon | 15 | 1 | 0 | No | No |
| 17829638 | DATA ENCRYPTION KEY SPLITS | June 2022 | October 2024 | Abandon | 29 | 0 | 1 | Yes | No |
| 17713868 | SECURITY SYSTEM AND METHOD | April 2022 | June 2023 | Allow | 15 | 1 | 0 | Yes | No |
| 17710536 | PREDICTIVE UPDATE OF PROFILE DATABASE WITH UPDATE LOGIC | March 2022 | March 2023 | Allow | 12 | 0 | 0 | Yes | No |
| 17612720 | SYSTEM AND METHOD FOR SECURELY DEFENDING AGAINST COLLUSIVE ATTACK UNDER INTERNET OF VEHICLES | March 2022 | March 2024 | Allow | 28 | 0 | 0 | Yes | No |
| 17647915 | OBJECT RESOLUTION AMONG ACCOUNT-LEVEL NAMESPACES FOR DATABASE PLATFORMS | January 2022 | January 2024 | Allow | 24 | 5 | 0 | Yes | No |
| 17573996 | PRIVACY SCORE | January 2022 | June 2023 | Allow | 17 | 1 | 0 | Yes | No |
| 17562837 | DIGITAL MEDIA REPRODUCTION AND LICENSING | December 2021 | January 2023 | Allow | 13 | 0 | 0 | Yes | No |
| 17456925 | AUTONOMOUS SECRETS RENEWAL AND DISTRIBUTION | November 2021 | March 2024 | Allow | 28 | 2 | 0 | Yes | No |
| 17528966 | CONFIDENTIAL INFORMATION TRACKING SYSTEM | November 2021 | June 2024 | Allow | 31 | 2 | 0 | Yes | No |
| 17528596 | NON-TRANSITORY COMPUTER READABLE STORAGE, OUTPUT CONTROL METHOD, AND TERMINAL DEVICE | November 2021 | September 2024 | Abandon | 34 | 1 | 0 | Yes | No |
| 17484937 | PERSONAL AUTHENTICATION APPARATUS SYSTEM AND METHOD | September 2021 | March 2023 | Allow | 17 | 1 | 0 | Yes | No |
| 17459289 | BIOMETRIC AUTHENTICATION THROUGH VASCULAR STUDIES | August 2021 | January 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17405443 | SYSTEMS AND METHODS FOR IMAGE PREPROCESSING AND SEGMENTATION FOR VISUAL DATA PRIVACY | August 2021 | December 2023 | Allow | 28 | 0 | 0 | No | No |
| 17445034 | COMPOSITE BIOMETRIC AUTHENTICATION | August 2021 | January 2023 | Allow | 17 | 0 | 0 | Yes | No |
| 17371198 | DEVICE DATA-AT-REST SECURITY USING EXTENDED VOLUME ENCRYPTION DATA | July 2021 | May 2024 | Allow | 34 | 1 | 0 | Yes | No |
| 17414353 | A CIRCUIT COMPILING DEVICE AND CIRCUIT EVALUATION DEVICE | June 2021 | December 2023 | Allow | 30 | 0 | 0 | No | No |
| 17315779 | SECURING A PATH AT A SELECTED NODE | May 2021 | November 2022 | Allow | 18 | 0 | 0 | No | No |
| 17210527 | SYSTEM AND METHOD OF FILELESS MALWARE DETECTION AND NON-TRANSITORY COMPUTER READABLE MEDIUM | March 2021 | June 2024 | Allow | 39 | 2 | 0 | No | No |
| 17210562 | SYSTEMS AND METHODS FOR MANAGING HARDWARE PRIVACY CONFIGURATION IN MODERN WORKSPACES | March 2021 | December 2023 | Allow | 33 | 1 | 0 | Yes | No |
| 17209202 | METHODS AND SYSTEMS FOR ADAPTIVE MULTI-FACTORED GEO-LOCATION BASED DOCUMENT ACCESS RIGHTS MANAGEMENT AND ENFORCEMENT | March 2021 | May 2024 | Abandon | 38 | 2 | 0 | No | No |
| 17184278 | COMMUNICATION APPARATUS, METHOD OF CONTROLLING THE COMMUNICATION APPARATUS, AND PROGRAM | February 2021 | July 2023 | Allow | 29 | 2 | 0 | No | No |
| 17267825 | Protection of Non-Access Stratum Communication in a Wireless Communication Network | February 2021 | December 2023 | Allow | 35 | 2 | 0 | Yes | No |
| 17166622 | URL-BASED AUTHENTICATION FOR PAYMENT CARDS | February 2021 | May 2023 | Allow | 28 | 0 | 0 | Yes | No |
| 17146862 | CENTRALIZED REPOSITORY SYSTEM FOR PERFORMING COMMUNICATION-BASED AUTHENTICATION | January 2021 | March 2024 | Abandon | 38 | 3 | 0 | No | No |
| 17125973 | METHOD AND SYSTEM FOR AUTOMATED USER AUTHENTICATION BASED ON VIDEO AND AUDIO FEED IN REAL-TIME | December 2020 | January 2024 | Abandon | 37 | 2 | 0 | No | No |
| 17123933 | ILLUMINATION-BASED USER AUTHENTICATION | December 2020 | January 2024 | Allow | 36 | 3 | 0 | Yes | No |
| 17087225 | Facial Profile Password to Modify User Account Data for Hands Free Transactions | November 2020 | October 2022 | Allow | 24 | 1 | 0 | No | No |
| 17064553 | PROCESSOR THAT MITIGATES SIDE CHANNEL ATTACKS BY REFRAINING FROM ALLOCATING AN ENTRY IN A DATA TLB FOR A MISSING LOAD ADDRESS WHEN THE LOAD ADDRESS MISSES BOTH IN A DATA CACHE MEMORY AND IN THE DATA TLB AND THE LOAD ADDRESS SPECIFIES A LOCATION WITHOUT A VALID ADDRESS TRANSLATION OR WITHOUT PERMISSION TO READ FROM THE LOCATION | October 2020 | June 2023 | Allow | 33 | 2 | 0 | Yes | No |
| 17044755 | ACCESS TO CONTENT OF ENCRYPTED DATA SESSION | October 2020 | February 2024 | Allow | 41 | 3 | 0 | No | No |
| 17028188 | WIRELESS COMMUNICATION DEVICE AND METHOD FOR SPYING COUNTER MEASURES | September 2020 | February 2023 | Allow | 29 | 0 | 0 | Yes | No |
| 17000269 | GRAPHICAL REPRESENTATION OF AN INFORMATION MANAGEMENT SYSTEM | August 2020 | September 2023 | Allow | 36 | 3 | 0 | Yes | No |
| 16941029 | Application Functionality Authentication And Authorization In A Multi-Camera System | July 2020 | March 2023 | Allow | 32 | 2 | 0 | Yes | No |
| 16930599 | ELECTROENCEPHALOGRAM HASHING DEVICE FOR AUTHENTICATION AND ROUTING | July 2020 | April 2023 | Allow | 33 | 1 | 0 | Yes | No |
| 16923747 | METHODS AND SYSTEMS FOR RECOGNIZING UNINTENDED FILE SYSTEM CHANGES | July 2020 | December 2023 | Allow | 41 | 2 | 0 | Yes | No |
| 16909353 | SCORING THE PERFORMANCE OF SECURITY PRODUCTS | June 2020 | April 2022 | Allow | 21 | 0 | 0 | Yes | No |
| 16904929 | METHOD FOR AUTOMATICALLY APPLYING ACCESS CONTROL POLICIES BASED ON DEVICE TYPES OF NETWORKED COMPUTING DEVICES | June 2020 | March 2024 | Allow | 45 | 4 | 0 | Yes | No |
| 16900494 | MULTI-PROCESS COMMUNICATION REGARDING GAMING INFORMATION | June 2020 | November 2022 | Abandon | 29 | 1 | 0 | No | No |
| 16883565 | APPLICATION-PROVISIONING FRAMEWORK FOR DATABASE PLATFORMS | May 2020 | June 2022 | Allow | 25 | 5 | 0 | Yes | No |
| 16876630 | SYSTEM AND METHOD FOR ENCRYPTION AND DECRYPTION BASED ON QUANTUM KEY DISTRIBUTION | May 2020 | January 2023 | Allow | 32 | 0 | 0 | Yes | No |
| 16764722 | DEVICE AUTHORIZATION SYSTEMS | May 2020 | May 2023 | Allow | 36 | 1 | 0 | No | No |
| 16870175 | SYSTEM AND METHOD FOR VERIFYING A REGEX GROUP | May 2020 | June 2022 | Allow | 25 | 0 | 0 | Yes | No |
| 16861905 | ADAPTIVE AUTHENTICATION | April 2020 | January 2023 | Allow | 33 | 1 | 0 | Yes | No |
| 16846968 | DETECTION AND MITIGATION OF RECURSIVE DOMAIN NAME SYSTEM ATTACKS | April 2020 | October 2024 | Allow | 54 | 4 | 0 | Yes | Yes |
| 16836816 | DATA PRIVACY PROTECTION ON CLOUD-BASED OPTIMIZATION SYSTEMS | March 2020 | May 2022 | Allow | 26 | 0 | 0 | No | No |
| 16827069 | AGGREGATION OF NETWORK ACCESS TO TENANT SPACES OF MULTI-TENANT STRUCTURES | March 2020 | March 2022 | Allow | 24 | 0 | 0 | Yes | No |
| 16821494 | SPOOFING DETECTION DEVICE AND A SPOOFING DETECTION METHOD | March 2020 | July 2023 | Abandon | 39 | 5 | 0 | Yes | No |
| 16791790 | EFFICIENT CENTRALIZED CREDENTIAL STORAGE FOR REMOTELY MANAGED NETWORKS | February 2020 | November 2022 | Abandon | 33 | 4 | 0 | Yes | No |
| 16778846 | USER EQUIPMENT AUTHENTICATION | January 2020 | June 2022 | Allow | 28 | 3 | 0 | Yes | No |
| 16634856 | METHOD AND DEVICE FOR PROTECTING PRIVACY | January 2020 | March 2022 | Allow | 26 | 0 | 0 | Yes | No |
| 16628652 | SFS ACCESS CONTROL METHOD AND SYSTEM, SFS AND TERMINAL DEVICE | January 2020 | October 2022 | Abandon | 33 | 1 | 0 | No | No |
| 16693024 | Electronic Device, Method For Controlling The Same, And Computer Readable Storage Medium | November 2019 | September 2023 | Abandon | 46 | 3 | 0 | No | No |
| 16674697 | Key Configuration Method, Apparatus, and System | November 2019 | August 2023 | Abandon | 45 | 4 | 0 | Yes | No |
| 16604714 | DEVICE AND METHOD FOR AUTHENTICATING TRANSPORT LAYER SECURITY COMMUNICATIONS | October 2019 | May 2023 | Allow | 43 | 2 | 0 | Yes | No |
| 16598415 | METHOD AND SYSTEM FOR SIGNING AN ARTIFICIAL INTELLIGENCE WATERMARK USING A QUERY | October 2019 | March 2023 | Allow | 41 | 2 | 0 | Yes | No |
| 16584284 | RANSOMWARE DETECTION AND MITIGATION | September 2019 | March 2022 | Allow | 30 | 3 | 0 | Yes | No |
| 16570480 | METHOD AND SYSTEM FOR INTEGRATING VOICE BIOMETRICS | September 2019 | March 2023 | Allow | 42 | 3 | 0 | Yes | No |
| 16566078 | SERVER KIT CONFIGURED TO MARSHAL RESOURCE CALLS AND METHODS THEREFOR | September 2019 | July 2022 | Abandon | 34 | 1 | 0 | No | No |
| 16563455 | DYNAMIC PRIVILEGE ALLOCATION BASED ON COGNITIVE MULTIPLE-FACTOR EVALUATION | September 2019 | May 2022 | Allow | 33 | 2 | 0 | Yes | No |
| 16556339 | METHODS FOR AUGMENTED REALITY DATA DECRYPTION AND DEVICES THEREOF | August 2019 | March 2023 | Allow | 42 | 3 | 0 | Yes | No |
| 16534479 | ANOMALY AND RANSOMWARE DETECTION | August 2019 | July 2024 | Allow | 59 | 6 | 0 | Yes | No |
| 16518144 | SYSTEMS AND METHODS FOR ROAMING MANAGEMENT BETWEEN ACCESS POINTS | July 2019 | April 2022 | Allow | 32 | 1 | 0 | Yes | No |
| 16517463 | INLINE MALWARE DETECTION | July 2019 | December 2021 | Allow | 29 | 2 | 0 | Yes | No |
| 16517465 | GENERATING MODELS FOR PERFORMING INLINE MALWARE DETECTION | July 2019 | October 2022 | Allow | 39 | 4 | 0 | Yes | No |
| 16426249 | Quarantining fake, counterfeit, jailbroke, or rooted mobile devices in the cloud | May 2019 | November 2022 | Allow | 42 | 6 | 0 | Yes | No |
| 16394290 | Controlling Content Visibility On A Computing Device Based On Computing Device Location | April 2019 | June 2022 | Allow | 38 | 2 | 0 | Yes | No |
| 16383252 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM | April 2019 | February 2023 | Allow | 47 | 5 | 0 | Yes | No |
| 16380533 | Synthetic Identification Protocol Apparatus and Method | April 2019 | May 2022 | Allow | 37 | 4 | 0 | No | No |
| 16380026 | AUTHENTICATION FOR FUNCTIONS AS A SERVICE | April 2019 | June 2022 | Allow | 38 | 4 | 0 | Yes | No |
| 16380715 | PREDICTIVE UPDATE OF PROFILE DATABASE WITH UPDATE LOGIC | April 2019 | December 2021 | Allow | 33 | 1 | 0 | Yes | No |
| 16278343 | Authentication Using Vaporization Device | February 2019 | July 2022 | Abandon | 41 | 2 | 0 | Yes | No |
| 16214825 | METHODS AND SYSTEMS FOR AUTOMATIC OBJECT RECOGNITION AND AUTHENTICATION | December 2018 | December 2022 | Allow | 48 | 4 | 1 | Yes | Yes |
| 16117636 | ENHANCING SECURITY DURING ACCESS AND RETRIEVAL OF DATA WITH MULTI-CLOUD STORAGE | August 2018 | April 2022 | Allow | 43 | 4 | 0 | Yes | Yes |
| 16118278 | ENRICHING DOCUMENT METADATA USING CONTEXTUAL INFORMATION | August 2018 | March 2022 | Allow | 43 | 2 | 0 | Yes | No |
| 15920832 | AUTONOMOUS SECRETS RENEWAL AND DISTRIBUTION | March 2018 | April 2023 | Allow | 60 | 3 | 1 | Yes | Yes |
| 15898020 | SYSTEM AND METHOD FOR PHYSICALLY DETECTING, IDENTIFYING, AND DIAGNOSING MEDICAL ELECTRONIC DEVICES CONNECTABLE TO A NETWORK | February 2018 | June 2022 | Allow | 52 | 4 | 0 | Yes | Yes |
| 15865016 | DISTRIBUTED SYSTEM WEB OF TRUST PROVISIONING | January 2018 | December 2022 | Allow | 59 | 5 | 1 | Yes | No |
| 15205377 | SECURING TEMPORARY DATA ON UNTRUSTED DEVICES | July 2016 | February 2017 | Allow | 8 | 0 | 0 | Yes | No |
| 15203610 | APPARATUS AND METHOD OF EXECUTION UNIT FOR CALCULATING MULTIPLE ROUNDS OF A SKEIN HASHING ALGORITHM | July 2016 | September 2016 | Allow | 3 | 0 | 0 | Yes | No |
| 14632129 | GENERATION OF ANALYSIS REPORTS USING TRUSTED AND PUBLIC DISTRIBUTED FILE SYSTEMS | February 2015 | May 2017 | Allow | 27 | 1 | 0 | Yes | No |
| 14476279 | VALIDATION OF A LOCATION RESOURCE BASED ON RECIPIENT ACCESS | September 2014 | April 2016 | Allow | 20 | 2 | 0 | Yes | No |
| 14330534 | APPARATUS AND METHODS FOR ACTIVATION OF COMMUNICATION DEVICES | July 2014 | March 2017 | Allow | 33 | 4 | 0 | Yes | No |
| 14245427 | VALIDATION OF A LOCATION RESOURCE BASED ON RECIPIENT ACCESS | April 2014 | April 2016 | Allow | 24 | 2 | 0 | Yes | No |
| 14202508 | SECURE DIGITAL COMMUNICATIONS | March 2014 | September 2014 | Allow | 6 | 0 | 0 | Yes | No |
| 14011257 | OWNER ACCESS POINT TO CONTROL THE UNLOCKING OF AN ENTRY | August 2013 | July 2017 | Allow | 46 | 7 | 0 | Yes | No |
| 14011004 | COMPUTER DEVICE, A METHOD FOR CONTROLLING A LOGIN STATUS OF A COMPUTER DEVICE AND A SERVER | August 2013 | July 2015 | Allow | 23 | 1 | 0 | Yes | No |
| 13631278 | SYSTEM, DEVICE, AND METHOD FOR SECURING VOICE AUTHENTICATION AND END-TO-END SPEECH INTERACTION | September 2012 | April 2015 | Allow | 31 | 3 | 0 | Yes | No |
| 13369481 | AUTOMATIC DISCOVERY OF SYSTEM INTEGRITY EXPOSURES IN SYSTEM CODE | February 2012 | August 2014 | Allow | 30 | 3 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner MCCOY, RICHARD ANTHONY.
With a 50.0% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 60.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner MCCOY, RICHARD ANTHONY works in Art Unit 2499 and has examined 96 patent applications in our dataset. With an allowance rate of 84.4%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 32 months.
Examiner MCCOY, RICHARD ANTHONY's allowance rate of 84.4% places them in the 54% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by MCCOY, RICHARD ANTHONY receive 1.96 office actions before reaching final disposition. This places the examiner in the 63% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by MCCOY, RICHARD ANTHONY is 32 months. This places the examiner in the 32% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +37.1% benefit to allowance rate for applications examined by MCCOY, RICHARD ANTHONY. This interview benefit is in the 87% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 30.4% of applications are subsequently allowed. This success rate is in the 51% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 4.5% of cases where such amendments are filed. This entry rate is in the 2% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 100.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 71% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 71.4% of appeals filed. This is in the 54% percentile among all examiners. Of these withdrawals, 20.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 0.0% are granted (fully or in part). This grant rate is in the 2% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 16% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 21% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.