Login with your work email address to view charts. No credit card required.
| Art Unit: | 2437 — Information security |
|---|---|
| Group: | 2400a-2430-2490 — Cryptography and Security |
| Classes: |
726 — Information security 713 — Electrical computers and digital processing systems: support 380 — Cryptography 705 — Data processing: financial, business practice, management, or cost/price determination 709 — Electrical computers and digital processing systems: multicomputer data transferring 348 — Television |
| Phone: | (571) 272-7961 |
| Email: | ali.abyaneh@uspto.gov |
| Location: | VA 22314 |
| Title: | Pat Examnr Computer Science |
| Service: | 21 years |
| Grade: | GS-14 |
| 3-Year Grant rate: | 82% over 236 cases |
|---|---|
| Difficulty: | Easier |
| Difficulty Percentile: | 40th
|
With Examiner Abyaneh, you have a 82% chance of getting an issued patent by 3 years after the first office action. Examiner Abyaneh is an easier examiner and in the 40th percentile across all examiners (with 100th percentile most difficult).
Below is the grant rate timeline for Examiner Abyaneh, where the timeline is relative to the date of the first office action. The three-year grant rate is the percentage of applications granted at three years after the first office action.
Examiner Abyaneh's grant rate is lower than that of Art Unit 2437 and higher than that of the USPTO.
| Average Office Actions Per Grant | |
|---|---|
| Examiner Abyaneh | 1.1 |
| Art Unit 2437 | 1.3 |
Examiner Abyaneh has granted 149 of 186 cases without any applicant-requested interviews for a grant rate of 80%.
Examiner Abyaneh has granted 44 of 50 cases with at least one applicant-requested interview for a grant rate of 88%.
With Examiner Abyaneh, conducting an interview increases your chance of getting a patent granted by 10%.
| Number | Title | OA Rejections | Status | IFW |
|---|---|---|---|---|
| 18197654 | Systems And Methods For Intelligent Cybersecurity Alert Similarity Detection And Cybersecurity Alert Handling | Rejection information available with a Premium Stats subscription. See our pricing. | Patented | View |
| 18147194 | Communication Link Analysis For False-Alarm Detection And Security Enhancement Using Enhanced Codes | Patented | View | |
| 18664480 | Providing Access Control And Identity Verification For Communications When Initiating A Communication To An Entity To Be Verified | Patented | View | |
| 18139488 | Method For Using Blockchain Technology To Verify Authenticity And Ownership Of Valuable Items Such As Luxury Watches | Abandoned | View | |
| 17861341 | Virtual Representation Of Individual In Computing Environment | Patented | View | |
| 17663883 | Network Security And Related Apparatuses, Methods, And Security Systems | Patented | View | |
| 18664488 | Providing Access Control And Identity Verification For Communications When Initiating A Communication To An Entity To Be Verified | Patented | View | |
| 18361415 | Detection Of Cybersecurity Threats Utilizing Established Baselines | Patented | View | |
| 18646624 | Domain Name System Data Exfiltration Detection Using Machine Learning Techniques | Patented | View | |
| 18043902 | Fiducial Mark Document Sharing | Patented | View | |
| 18361341 | Techniques For Utilizing A Sensor In Detecting Privilege Escalation | Patented | View | |
| 19053825 | Computer-Based Systems Configured For Domain Name Central Blocking Systems And Methods Of Use Thereof | Patented | View | |
| 19070170 | Techniques For Prioritizing Cybersecurity Remediation Actions Based On A Data Risk Score | Patented | View | |
| 17516394 | Multichannel Authentication And Tokenization System | Patented | View | |
| 18651643 | Malicious Prompt Management For Large Language Models | Patented | View | |
| 17878706 | Signature Graph Method For Enabling Human Authentication Of High-Entropy Data | Patented | View | |
| 17481579 | Physical Storage Vault For Physical Items Of Digital Twin Nfts | Patented | View | |
| 17111398 | Identification Of Potential Network Vulnerability And Security Responses In Light Of Real-Time Network Risk Assessment | Abandoned | View | |
| 18585687 | Threat Mitigation System And Method | Patented | View | |
| 17983356 | Information Security Management Method, Secure Management Circuit, And Server | Patented | View | |
| 18636129 | Home-Based Physical And Cyber Integrated Security - Intrusion Detection System (Pcis-Ids) | Patented | View | |
| 17455485 | Detection Of Spoofing Or Jamming Attacks In Wireless Communication System | Patented | View | |
| 17627820 | Dag-Awtc Ledger System Using Bft Verification Consensus Mechanism | Patented | View | |
| 17478637 | Method And Apparatus For Protecting Numbers And Strings Using Format-Preserving Encryption With Automatic Precision | Patented | View | |
| 17967456 | Method And Apparatus For Revoking User Equipment Authentication In Wireless Communication System | Patented | View | |
| 18671602 | Autonomous Machine Learning Methods For Detecting And Thwarting Ransomware Attacks | Patented | View | |
| 17992320 | System And Method For Obscuring Status Of A Network Service | Patented | View | |
| 18349226 | Integrated Security And Threat Prevention And Detection Platform | Patented | View | |
| 17958029 | Blockchain-Implemented Control Method And System For Controlling An External Process Or System | Patented | View | |
| 17878665 | Detecting Shadowed Domains | Patented | View | |
| 17878648 | System For Automatically Determining And Categorizing An Event For A Firearm | Patented | View | |
| 17573045 | Electronic Device For Controlling Connection To Access Point And Method Of The Same | Patented | View | |
| 18048737 | Integrity Protected Command Buffer Execution | Patented | View | |
| 18446175 | System And Method For Catastrophic Event Modeling | Abandoned | View | |
| 18913331 | System And Method For Software Service Cybersecurity Remediation | Patented | View | |
| 18617225 | Detecting Malware Infection Path In A Cloud Computing Environment Utilizing A Security Graph | Patented | View | |
| 18529596 | Secure Circuit Integrated With Memory Layer | Patented | View | |
| 17194768 | Threat Registry And Assessment | Abandoned | View | |
| 17742359 | Methods, Systems, And Computer Readable Media For Processing Quic Communications In A Network | Patented | View | |
| 18097083 | Facilitating Device Fingerprinting Through Assignment Of Fuzzy Device Identifiers | Patented | View | |
| 17512563 | Detecting And Protecting Against Inconsistent Use Of Cross-Site Request Forgery Mitigation Features | Patented | View | |
| 18147869 | Security Defending Method, Coprocessor, And Processing Apparatus | Patented | View | |
| 17384054 | User Impersonation System | Patented | View | |
| 18102074 | Web-Authorization Using Enhanced Cookie | Patented | View | |
| 17860044 | Feedback-Based Control System For Software Defined Networks | Abandoned | View | |
| 18414373 | Cross-Network Security Evaluation | Patented | View | |
| 18046593 | Automatic Provisioning And Onboarding Of Offline Or Disconnected Machines | Patented | View | |
| 17897813 | Area-Optimized Row Hammer Mitigation | Patented | View | |
| 18490006 | Methods And Systems For Provisioning Cloud Computing Services | Patented | View | |
| 17109081 | Early Platform Hardening Technology For Slimmer And Faster Boot | Abandoned | View |
Subscribe to Premium Examiner Statistics for unlimited access for your law firm.
Disclaimer: We do not provide any guarantees as to the accuracy of the statistics presented above and under
no circumstances will we be liable for any outcome resulting from your reliance on the above statistics.