Login with your work email address to view charts. No credit card required.
| Art Unit: | 2497 — Information security |
|---|---|
| Group: | 2400a-2430-2490 — Cryptography and Security |
| Classes: |
726 — Information security 713 — Electrical computers and digital processing systems: support 380 — Cryptography 715 — Data processing: presentation processing of document, operator interface processing, and screen saver display processing 455 — Telecommunications 370 — Multiplex communications |
| Phone: | (571) 272-1239 |
| Email: | ali.cheema@uspto.gov |
| Location: | VA 22314 |
| Title: | Pat Examnr Comptr Engrg |
| Service: | 8 years |
| Grade: | GS-13 |
| 3-Year Grant rate: | 65% over 163 cases |
|---|---|
| Difficulty: | Harder |
| Difficulty Percentile: | 67th
|
With Examiner Cheema, you have a 65% chance of getting an issued patent by 3 years after the first office action. Examiner Cheema is a harder examiner and in the 67th percentile across all examiners (with 100th percentile most difficult).
Below is the grant rate timeline for Examiner Cheema, where the timeline is relative to the date of the first office action. The three-year grant rate is the percentage of applications granted at three years after the first office action.
Examiner Cheema's grant rate is lower than that of Art Unit 2497 and lower than that of the USPTO.
| Average Office Actions Per Grant | |
|---|---|
| Examiner Cheema | 1.8 |
| Art Unit 2497 | 1.2 |
Examiner Cheema has granted 66 of 101 cases without any applicant-requested interviews for a grant rate of 65%.
Examiner Cheema has granted 40 of 62 cases with at least one applicant-requested interview for a grant rate of 65%.
With Examiner Cheema, conducting an interview does not change your chance of getting your patent granted.
| Number | Title | OA Rejections | Status | IFW |
|---|---|---|---|---|
| 18571370 | Integrity Verification System Of Circuit Information And Integrity Verification Method Of Circuit Information | Rejection information available with a Premium Stats subscription. See our pricing. | Abandoned | View |
| 18807891 | Electronic Document Presentation Management System | Patented | View | |
| 17628961 | A User Equipment, And Method For Receiving An Extensible Authentication Protocol (Eap) Identity Request | Patented | View | |
| 18392773 | Data Confidence Graphs | Patented | View | |
| 18664442 | Enhanced Vehicle Secure Onboard Communication Protocol With Encryption | Patented | View | |
| 18807883 | Electronic Document Presentation Management System | Patented | View | |
| 18344284 | Implementing Personal Knowledge Graphs | Patented | View | |
| 18594119 | Storage Agnostic Data Path Interception For Transparent Snapshot Data Protection In Containerized Environments | Patented | View | |
| 18785735 | Secure Controller Area Network In Vehicles | Patented | View | |
| 18643518 | System And Method Of A Collision Free Secure Workspace Setup Of A Group Of Peripheral Devices With A Host Information Handling System | Patented | View | |
| 18769537 | Smart Contract Configuration Using Unstructured Data | Patented | View | |
| 18377357 | Authentication And Identification Of Products | Patented | View | |
| 18753727 | Streamlined Creation And Expansion Of A Wireless Mesh Network | Patented | View | |
| 18321232 | Integrity Verification Method And Related Device | Patented | View | |
| 18702204 | Decentralized Configuration Integrity Check In Microservices Environment | Patented | View | |
| 17932975 | System, Method, And Computer-Readable Storage Media For Authenticating An Endpoint Device | Patented | View | |
| 18745936 | Multi-Context Sensor Security | Patented | View | |
| 18626256 | Real-Time Data Evaluation For Model Training And Execution | Patented | View | |
| 18700886 | Technique For Handling Sealed Capabilities | Patented | View | |
| 18281857 | Secure Computation System, Secure Computation Server Apparatus, Secure Computation Method, And Secure Computation Program | Patented | View | |
| 19191857 | Creating And Using Call Graphs To Select An Update | Patented | View | |
| 18694126 | A Method And A System For Checking Ownership And Integrity Of An Ai Model Using Distributed Ledger Technology (Dlt) | Patented | View | |
| 17775333 | Anomaly Detection Method, Device And Computer Readable Medium | Abandoned | View | |
| 19220025 | Payment Management System Using Asymmetric Cryptography To Ensure Information Accuracy | Patented | View | |
| 19191907 | Using Call Graphs To Identify An Update When Upgrading To A Newer Version | Patented | View | |
| 17368386 | Secure Serial Peripheral Interface (Spi) Flash | Patented | View | |
| 18251218 | Method For Certifying The Authenticity Of Digital Files Generated By A Communication Device | Patented | View | |
| 18036159 | Identification And Authentication Of Multiple Controllers | Patented | View | |
| 18401044 | Secure Communications Using Pre-Shared Keys And Live Membership | Patented | View | |
| 17923722 | Method And Apparatus For Preventing Network Attacks In A Network Slice | Patented | View | |
| 19078119 | Electronic Document Presentation Management System | Patented | View | |
| 18124786 | Suspicious Communication Detection Apparatus, Suspicious Communication Detection Method, And Suspicious Communication Detection Program | Patented | View | |
| 19069793 | Identifying An Update Of A Code Dependency To Use Based On Risk And Benefit Trade-Offs | Patented | View | |
| 18083171 | Message Chain-Based Controller Area Network (Can) Security System And Method With Hash Function | Patented | View | |
| 19020659 | Determining Call Graphs To Identify Which Update Of A Code Dependency To Use | Patented | View | |
| 19005913 | Data Integration And Quality Control System | Patented | View | |
| 17929998 | Multi-Platform Key Recovery For Trusted Code | Abandoned | View | |
| 18673699 | Detecting Profile-Based Wireless Mesh Node Failover In Communication Networks | Patented | View | |
| 18089214 | Computer Security System With Rules Engine For Network Traffic Analysis | Patented | View | |
| 19088334 | Portable Communication Device Profile Management Using Token | Patented | View | |
| 19086702 | Neural Processing Device, Non-Transitory Computer-Readable Recording Medium And Method For Transferring Ownership Of The Neural Processing Device Thereof | Patented | View | |
| 18989883 | Identifying And Addressing Potential Vulnerabilities In Third-Party Code | Patented | View | |
| 18863577 | Method For Remote Generation Of Two Arbitrary-Length Identical Random Cryptographic Keys With The Device-Independent Security Using Entangled Multi-Photon Sources Of Quantum Light | Patented | View | |
| 18961542 | Full-Link Data Security Protection Method And System | Patented | View | |
| 18985870 | Dynamic Orchestration-Based Audio-Video Security Protection Method, Device And System | Patented | View | |
| 18951189 | Identifying An Update Of A Code Dependency To Use Based On Risk And Benefit Trade-Offs | Patented | View | |
| 18774334 | Receiving Information Through A Zero-Knowledge Data Management Network | Patented | View | |
| 18178587 | Systems And Methods For Distributed Ledger Migration | Patented | View | |
| 18459122 | Detecting Possible Attacks On Artificial Intelligence Models Using Strengths Of Causal Relationships In Training Data | Patented | View | |
| 18377522 | System And Method For Web-Browser Based End-To-End Encrypted Messaging And For Securely Implementing Cryptography Using Client-Side Scripting In A Web Browser | Patented | View |
Subscribe to Premium Examiner Statistics for unlimited access for your law firm.
Disclaimer: We do not provide any guarantees as to the accuracy of the statistics presented above and under
no circumstances will we be liable for any outcome resulting from your reliance on the above statistics.