Login with your work email address to view charts. No credit card required.
| Art Unit: | 2492 — Information security |
|---|---|
| Group: | 2400a-2430-2490 — Cryptography and Security |
| Classes: |
726 — Information security 713 — Electrical computers and digital processing systems: support 380 — Cryptography 382 — Image analysis 705 — Data processing: financial, business practice, management, or cost/price determination |
| Phone: | (571) 270-1018 |
| Email: | devin.almeida@uspto.gov |
| Location: | VA 22314 |
| Title: | Pat Examnr Elctrl Engrg |
| Service: | 20 years |
| Grade: | GS-13 |
| 3-Year Grant rate: | 71% over 187 cases |
|---|---|
| Difficulty: | Medium |
| Difficulty Percentile: | 59th
|
With Examiner Almeida, you have a 71% chance of getting an issued patent by 3 years after the first office action. Examiner Almeida is a medium examiner and in the 59th percentile across all examiners (with 100th percentile most difficult).
Below is the grant rate timeline for Examiner Almeida, where the timeline is relative to the date of the first office action. The three-year grant rate is the percentage of applications granted at three years after the first office action.
Examiner Almeida's grant rate is lower than that of Art Unit 2492 and lower than that of the USPTO.
| Average Office Actions Per Grant | |
|---|---|
| Examiner Almeida | 2.2 |
| Art Unit 2492 | 1.6 |
Examiner Almeida has granted 85 of 121 cases without any applicant-requested interviews for a grant rate of 70%.
Examiner Almeida has granted 47 of 66 cases with at least one applicant-requested interview for a grant rate of 71%.
With Examiner Almeida, conducting an interview increases your chance of getting a patent granted by 1%.
| Number | Title | OA Rejections | Status | IFW |
|---|---|---|---|---|
| 18196921 | Use Of Tensile Spheres For Extended Symmetric Cryptography | Rejection information available with a Premium Stats subscription. See our pricing. | Patented | View |
| 18603564 | Fast Polynomial Evaluation Under Fully Homomorphic Encryption By Products Of Differences From Roots Using Rotations | Patented | View | |
| 18377049 | Integrated Circuit And Operation Method | Abandoned | View | |
| 18253424 | Digital Id Storage And Federation Service Model | Abandoned | View | |
| 18206756 | Systems And Methods For Real-Time Traceability Using An Obfuscation Architecture | Patented | View | |
| 17902531 | Methods, Systems, And Computer Readable Media For Automatic Category 1 Message Filtering Rules Configuration By Learning Topology Information From Network Function (Nf) Repository Function (Nrf) | Patented | View | |
| 18256314 | Authenticating Packaged Products | Patented | View | |
| 17982632 | Network Device, Communication Control System, Communication Control Method, And Non-Transitory Computer Readable Storage Medium | Patented | View | |
| 18377166 | Apparatus And Method For Facilitating Zero-Knowledge Proofs | Patented | View | |
| 17797458 | One-Time-Use Secret Bootstrapping In Container-Orchestrated Environments | Patented | View | |
| 16692671 | System And Method For Database Recovery For Encrypted Indexes | Patented | View | |
| 18307214 | Apparatuses, Methods And Computer Programs For Executing An Executable, And Method For Distributing Software Or Firmwares | Patented | View | |
| 18147757 | System And Method For Proactively Identifying Poisoned Training Data Used To Train Artificial Intelligence Models | Patented | View | |
| 17586721 | Client Authentication And Data Management System | Patented | View | |
| 16752102 | Systems And Methods For Regulating Application Permissions | Patented | View | |
| 18127420 | Method For Receiving Firmware And Method For Transmitting Firmware | Abandoned | View | |
| 17919566 | Flexible Content Selection Processes Using Secure Multi-Party Computation | Patented | View | |
| 17692882 | Malware Detection And Mitigation System And Method Therefor | Patented | View | |
| 17650346 | Computer-Based System To Validate Build Integrity Of Software Products | Patented | View | |
| 17946097 | Experience Based Dispatch Of Regulated Workloads In A Cloud Environment | Patented | View | |
| 17802786 | Data Processing Device, Data Processing Method, Data Processing Program, Data Extraction Device, Data Extraction Method, And Data Extraction Program | Abandoned | View | |
| 17317996 | Symbolic Execution For Web Application Firewall Performance | Patented | View | |
| 17581579 | Selective Communication Interfaces For Programmable Parts | Patented | View | |
| 18025699 | Secure Transfer Of Health Information | Abandoned | View | |
| 17730051 | Systems, Methods, And Apparatuses For Integrating A Defense Mechanism Into Deep-Learning-Based Systems To Defend Against Adversarial Attacks | Patented | View | |
| 17084325 | Secure Enclave Pathing Configuration For Data Confidence Fabrics | Patented | View | |
| 17659743 | Bit Level Sharding Of Sensitive Data For Increased Security | Patented | View | |
| 18304309 | Dynamic Group Membership For Devices | Patented | View | |
| 17447122 | System And Method To Generate Prime Numbers In Cryptographic Applications | Patented | View | |
| 17887491 | Method Of Defense Against Cryptosystem Timing Attack, Associated Cryptosystem Processing Circuit, And Associated Electronic Device | Patented | View | |
| 17805671 | Security Protection For Synchronization Pulses | Patented | View | |
| 18094747 | Use Of Irrational Numbers In Elliptic Curve Cryptography | Patented | View | |
| 17707199 | Penetration Test Method And System For Network Device | Abandoned | View | |
| 17759211 | Real-Time And Independent Cyber-Attack Monitoring And Automatic Cyber-Attack Response System | Patented | View | |
| 17581864 | Secured Numeric And/or Alphanumeric Method Of Entry | Abandoned | View | |
| 17586010 | Method And System For Detecting Malicious Files In A Non-Isolated Environment | Patented | View | |
| 17447129 | System And Method To Optimize Decryption Operations In Cryptographic Applications | Patented | View | |
| 17988614 | Encrypting Access To Digital Assets Without Storing Sensitive Security Data For Decryption | Abandoned | View | |
| 17494811 | Data Obfuscation Platform For Improving Data Security Of Preprocessing Analysis By Third Parties | Abandoned | View | |
| 16523085 | Monitoring Operating System Invariant Information | Patented | View | |
| 18328412 | Method And Apparatus For Processing Biometric Information In Electronic Device | Patented | View | |
| 18133884 | Distributed Digital Security System | Patented | View | |
| 17723711 | Methods And Systems For Protecting Against Memory-Based Side-Channel Attacks | Patented | View | |
| 17354138 | Integrated Circuit Side-Channel Mitigation Mechanism | Patented | View | |
| 16987733 | System, Authorization Server, Control Method, And Storage Medium | Abandoned | View | |
| 17829882 | Detecting Ddos Attacks By Correlating Inbound And Outbound Network Traffic Information | Patented | View | |
| 16935253 | Cloud Access Security Broker Systems And Methods For Active User Identification And Load Balancing | Patented | View | |
| 16917177 | Deep Learning-Based Analysis Of Signals For Threat Detection | Patented | View | |
| 17581642 | Systems And Methods For Remote Secure Erasure Of Fingerprint Data From Information Handling Systems | Patented | View | |
| 17711048 | Privacy-Protection-Based Data Processing Model Acquisition Method And Apparatus, Terminal Device And Storage Medium | Patented | View |
Subscribe to Premium Examiner Statistics for unlimited access for your law firm.
Disclaimer: We do not provide any guarantees as to the accuracy of the statistics presented above and under
no circumstances will we be liable for any outcome resulting from your reliance on the above statistics.