Login with your work email address to view charts. No credit card required.
| Art Unit: | 2434 — Information security |
|---|---|
| Group: | 2400a-2430-2490 — Cryptography and Security |
| Classes: |
726 — Information security 713 — Electrical computers and digital processing systems: support 380 — Cryptography 715 — Data processing: presentation processing of document, operator interface processing, and screen saver display processing 370 — Multiplex communications 705 — Data processing: financial, business practice, management, or cost/price determination 706 — Data processing: artificial intelligence |
| Phone: | (571) 272-8155 |
| Email: | aubrey.wyszynski@uspto.gov |
| Location: | VA 22314 |
| Title: | Pat Examnr Compr Engrg |
| Service: | 21 years |
| Grade: | GS-13 |
| 3-Year Grant rate: | 91% over 240 cases |
|---|---|
| Difficulty: | Very Easy |
| Difficulty Percentile: | 14th
|
With Examiner Wyszynski, you have a 91% chance of getting an issued patent by 3 years after the first office action. Examiner Wyszynski is a very easy examiner and in the 14th percentile across all examiners (with 100th percentile most difficult).
Below is the grant rate timeline for Examiner Wyszynski, where the timeline is relative to the date of the first office action. The three-year grant rate is the percentage of applications granted at three years after the first office action.
Examiner Wyszynski's grant rate is higher than that of Art Unit 2434 and higher than that of the USPTO.
| Average Office Actions Per Grant | |
|---|---|
| Examiner Wyszynski | 1.2 |
| Art Unit 2434 | 1.3 |
Examiner Wyszynski has granted 178 of 200 cases without any applicant-requested interviews for a grant rate of 89%.
Examiner Wyszynski has granted 40 of 40 cases with at least one applicant-requested interview for a grant rate of 100%.
With Examiner Wyszynski, conducting an interview increases your chance of getting a patent granted by 12%.
| Number | Title | OA Rejections | Status | IFW |
|---|---|---|---|---|
| 18359813 | Cyberattack Scoring Method, Cyberattack Scoring Apparatus, And Computer Readable Storage Medium Storing Instructions To Perform Cyberattack Scoring Method | Rejection information available with a Premium Stats subscription. See our pricing. | Patented | View |
| 18298867 | Method And System For An Integrated Process To Streamline Privileged Access Management | Patented | View | |
| 18363880 | Contextual Security Policy Engine For Compute Node Clusters | Patented | View | |
| 18362537 | Scalable Flow Differentiation For Networks With Overlapping Ip Addresses | Patented | View | |
| 17826942 | Optimization For Access Policies In Computer Systems | Patented | View | |
| 18425275 | Management Of Location-Based Security Policies Using Out Of Band Methods | Patented | View | |
| 18185906 | Location-Based Zero Trust Application Access | Patented | View | |
| 18194588 | Application Assurance System Having A Method Of Offloading Service From An Edge Device To The Cloud | Patented | View | |
| 18597258 | Quantum Key Distribution System To Overcome Intercept-Resend And Detector-Control Quantum Hacking | Patented | View | |
| 18679355 | Dynamic Reconstruction Of Cloud Application Traffic For Security Monitoring | Patented | View | |
| 18483230 | Method And System For Quantifying And Improving Conformance To Least Privilege Security Policies | Patented | View | |
| 18464092 | Browser Extension Access Based On Re-Authorization | Patented | View | |
| 18761517 | Llm Powered Security Product Facade | Patented | View | |
| 18034839 | Management Device And Program | Patented | View | |
| 17457992 | Token-Based Session Establishment For Client Computing Devices | Patented | View | |
| 18446053 | Dynamic Policy Enforcement For Cloud-Based Applications In An Enterprise Environment | Patented | View | |
| 17726592 | Securing Web Browsing On A Managed User Device | Patented | View | |
| 18109800 | User Plane Integrity Protection | Patented | View | |
| 18046622 | Cyber Recovery Forensic Kit -- Application-Based Granularity | Patented | View | |
| 18999167 | Constraint-Based Resource Planning For Server Clusters | Patented | View | |
| 18155610 | Adjusting Behavior Of An Endpoint Security Agent Based On Network Location | Patented | View | |
| 18113983 | Providing Information Security To An Entity By Detecting Impossible Travel Events Across Multiple Cloud-Based Application Services | Patented | View | |
| 18206214 | System For Managing Iot Devices | Abandoned | View | |
| 18025913 | Inference Device, Inference Method, And Inference Program | Abandoned | View | |
| 18745043 | Managing And Routing Messages To Distributed User Devices In An Enterprise Computing Environment | Patented | View | |
| 18423012 | Data Platform With Unified Privileges | Patented | View | |
| 18475868 | Methods For Providing An Alert Or An Alarm To A User Of A Mobile Communications Device | Patented | View | |
| 18190368 | Secure Infrastructure As Code (Iac) Solution For Deploying Cloud Resources | Patented | View | |
| 18123622 | Network Security Management Method And Computer Device | Patented | View | |
| 17672669 | Configuring A Client Immutable Identification Profile | Patented | View | |
| 18042210 | Dynamic Identity Authentication | Patented | View | |
| 18110691 | Graph-Based Multi-Staged Attack Detection And Visualization In The Context Of An Attack Framework | Patented | View | |
| 17915367 | Authentication Using An Ephemeral Asymmetric Keypair | Patented | View | |
| 18616156 | System And Method For Restricting Communications Between Virtual Private Cloud Networks Through Security Domains | Patented | View | |
| 17895375 | Method For Signing Key Management By Electronic Device, And Electronic Device Therefor | Patented | View | |
| 17634979 | Hierarchical System Firewall And Configuration Method | Patented | View | |
| 17954807 | Computer Based Systems Configured To Adjust Frequency Scanning Of The Dark Web In Search Of Information And Method Of Use Thereof | Patented | View | |
| 18773421 | Methods For Providing An Alert Or An Alarm To A User Of A Mobile Communications Device | Patented | View | |
| 18830499 | Intelligent Photo Album Sorting And Privacy Protection Method | Patented | View | |
| 18428890 | Secure Execution Of User-Defined Functions | Patented | View | |
| 18545519 | Securely Manipulating And Utilizing User Credentials | Abandoned | View | |
| 17893095 | Setting An Authorization Level At Enrollment | Patented | View | |
| 18429681 | System For Dynamic Communication Channel Switching Based On Preconfigured Network Security Protocols | Patented | View | |
| 18382233 | Dynamically Scaled Ddos Mitigation | Patented | View | |
| 17746503 | Establishing Multiple Security Associations In A Connection Operation | Patented | View | |
| 17862152 | Information Processing Apparatus, Information Processing Method, And Storage Medium | Abandoned | View | |
| 18067241 | Intrusion Detection And Prevention System Rule Automation And Optimization | Patented | View | |
| 18386969 | Innocent Until Proven Guilty (Iupg): Adversary Resistant And False Positive Resistant Deep Learning Models | Patented | View | |
| 18197895 | Nonce-Based Enterprise Security Policy Enforcement | Patented | View | |
| 18478692 | Differentiated Containerization And Execution Of Web Content Based On Trust Level And Other Attributes | Patented | View |
Subscribe to Premium Examiner Statistics for unlimited access for your law firm.
Disclaimer: We do not provide any guarantees as to the accuracy of the statistics presented above and under
no circumstances will we be liable for any outcome resulting from your reliance on the above statistics.