Prosecution Insights
Last updated: April 19, 2026
Application No. 18/770,949

SYSTEMS AND METHODS FOR ASSESSING CYBERSECURITY RISK IN A WORK FROM HOME ENVIRONMENT

Non-Final OA §DP
Filed
Jul 12, 2024
Examiner
FAROOQUI, QUAZI
Art Unit
2491
Tech Center
2400 — Computer Networks
Assignee
Bitsight Technologies Inc.
OA Round
1 (Non-Final)
83%
Grant Probability
Favorable
1-2
OA Rounds
2y 8m
To Grant
98%
With Interview

Examiner Intelligence

Grants 83% — above average
83%
Career Allow Rate
371 granted / 448 resolved
+24.8% vs TC avg
Strong +15% interview lift
Without
With
+15.1%
Interview Lift
resolved cases with interview
Typical timeline
2y 8m
Avg Prosecution
17 currently pending
Career history
465
Total Applications
across all art units

Statute-Specific Performance

§101
9.3%
-30.7% vs TC avg
§103
59.6%
+19.6% vs TC avg
§102
18.2%
-21.8% vs TC avg
§112
6.9%
-33.1% vs TC avg
Black line = Tech Center average estimate • Based on career data from 448 resolved cases

Office Action

§DP
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Detailed Action This office action is response to the application 18/770,949 filed on 07/12/2024. Claims 1-20 are pending in this communication. Allowable subject matter Claims 1-20 are allowable if the applicant overcomes the double patenting rejection. Double Patenting The non-statutory obviousness type double patenting (ODP) rejection is based on a judicially created doctrine grounded in public policy (a policy reflected in the statute) so as to prevent the unjustified or improper time wise extension of the “right to exclude” granted by a patent and to prevent possible harassment by multiple assignees. A non-statutory obviousness-type double patenting rejection is appropriate where the conflicting claims are not identical, but at least one examined application claim is not patentably distinct from the reference claim(s) because the examined application claim is either anticipated by, or would have been obvious over, the reference claim(s). See, e.g., In re Berg, 140 F.3d 1428, 46 USPQ2d 1226 (Fed. Cir. 1998); In re Goodman, 11 F.3d 1046, 29 USPQ2d 2010 (Fed. Cir. 1993); In re Longi, 759 F.2d 887, 225 USPQ 645 (Fed. Cir. 1985); In re Van Ornum, 686 F.2d 937, 214 USPQ 761 (CCPA 1982); In re Vogel, 422 F.2d 438, 164 USPQ 619 (CCPA 1970); and In re Thorington, 418 F.2d 528, 163 USPQ 644 (CCPA 1969). A timely filed terminal disclaimer in compliance with 37 CFR 1.321(c) or 1.321(d) may be used to overcome an actual or provisional rejection based on a non-statutory double patenting ground provided the reference application or patent either is shown to be commonly owned with this application, or claims an invention made as a result of activities undertaken within the scope of a joint research agreement. A terminal disclaimer must be signed in compliance with 37 CFR 1.321(b). The USPTO internet Web site contains terminal disclaimer forms which may be used. Please visit http://www.uspto.gov/forms/. The filing date of the application will determine what form should be used. A web-based eTerminal Disclaimer may be filled out completely online using web-screens. An eTerminal Disclaimer that meets all requirements is auto-processed and approved immediately upon submission. For more information about eTerminal Disclaimers, refer to http://www.uspto.gov/patents/process/file/efs/guidance/eTD-info-I.jsp. The following table shows anticipated respective claims of the instant application against the claims of US Patent No. US 12,079,347. Table 1 Instant Application Patent US 12,079,347 1. A computer-implemented method comprising: obtaining a network dataset comprising a plurality of entries, wherein each entry comprises a device identifier, a network identifier, and a timestamp identifier, wherein the plurality of entries are derived from (i) at least one computer network of a plurality of computer networks associated with an entity and (ii) at least one computer network of a plurality of computer networks not associated with the entity and providing access to the at least one computer network of the plurality of computer networks associated with the entity; obtaining a plurality of Internet Protocol (IP) addresses associated with (i) the entity and (ii) a plurality of entities unrelated to the entity, wherein the entity and the plurality of entities unrelated to the entity are each associated with a respective unique identifier (UID) of a plurality of UIDs; filtering, based on the network identifier of each of the plurality of entries, the network dataset to form a filtered network dataset; determining, based on the IP addresses associated with the entity and the filtered network dataset, one or more of the plurality of computer networks not associated with the entity and providing access to the at least one computer network of the plurality of computer networks associated with the entity comprises one or more remote office networks associated with the entity; and assessing a cybersecurity state of the entity based on an evaluation of security characteristics of the IP addresses associated with the entity and security characteristics of one or more IP addresses attributed to the one or more remote office networks. 1. A computer-implemented method comprising: obtaining, for at least one computer network of a plurality of computer networks associated with an entity, a first network dataset; obtaining, for at least one computer network of a plurality of computer networks not associated with the entity and providing access to the at least one computer network of the plurality of computer networks associated with the entity, a second network dataset; combining the first and second network datasets to form a combined dataset comprising a plurality of entries, wherein each entry comprises a device identifier, a network identifier, and a timestamp identifier; obtaining a plurality of Internet Protocol (IP) addresses associated with the entity; obtaining a plurality of IP addresses associated with a plurality of entities unrelated to the entity, wherein the entity and the plurality of entities unrelated to the entity are each associated with a unique identifier (UID); for each of the plurality of entries, if the respective network identifier of the entry corresponds to a thresh old number of associated UIDs, removing the entry from the combined dataset to form a filtered dataset; determining, based in part on the IP addresses associated with the entity, whether each of the plurality of computer networks not associated with the entity comprises a remote office network of one or more remote office networks associated with the entity based on the filtered dataset; and assessing a cybersecurity state of the entity based on an evaluation of security characteristics of the IP addresses associated with the entity and security characteristics of one or more IP addresses attributed to the one or more remote office networks. Independent claims 1 and 19 have been worded different, but same innovation of independent claims 1 and 19, respectively of Patent US 12,079,347. Claims 1 & 19 are rejected in view of US 12,079,347 and further in view of RASHIDI; Bahman (US 2022/0417261 A1). The motivation is - assessing an entity's cybersecurity state by evaluating the security characteristics of its IP addresses and those of its remote office networks offers several key advantages, primarily centered on achieving comprehensive asset visibility, proactive threat detection, and informed risk management across the entire digital infrastructure. RASHIDI discloses a technique for query, analysis and classification. It is well settled that broadening the scope of claims would have been obvious to one of ordinary skill in the art in view of the narrower issued claims. In re Van Ornum, 686 F.2d 937, 214 USPQ 761 (CCPA 1982) and In re Goodman, 11 F.3d 1046, 29 USPQ2d 2010 (Fed. Cir. 1993). Therefore claim 1 of US Patent US 12,079,347 anticipate claims 1 & 19 of the instant application. Claims 1-20 are provisionally rejected on the ground of nonstatutory obviousness-type double patenting as being unpatentable over claims 1 & 19 of the Patent US 12,079,347 in view of prior art RASHIDI. Although the claims at issue are not identical, they are not patentably distinct from each other over Patent US 12,079,347 in view of RASHIDI. It would have been obvious to one of ordinary skill in the art before the effective filing date of the invention to modify the invention of claims 1 & 19 of the US 12,079,347 to include RASHIDI inventions to obtain predictable results. The motivation is - assessing an entity's cybersecurity state by evaluating the security characteristics of its IP addresses and those of its remote office networks offers several key advantages, primarily centered on achieving comprehensive asset visibility, proactive threat detection, and informed risk management across the entire digital infrastructure. Conclusion Following prior art has been consulted but not applied: CASASSA MONT; Marco et al. (US 2018/0375953 A1) – Determining a persistent network identity of a networked device. Any inquiry concerning this communication or earlier communications from the examiner should be directed to QUAZI FAROOQUI whose telephone number is (571) 270-1034 or Quazi.farooqui@uspto.gov. The examiner can normally be reached on Monday-Friday 9:00 am to 5:30 pm, EST. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Amir Mehrmanesh can be reached on (571) 270-3351 or amir.mehrmanesh@USPTO.GOV. The fax phone number for Examiner Farooqui assigned is 571-270-2034. Information regarding the status of an application may be obtained from the Patent Application Information Retrieval (PAIR) system. Status information for published applications may be obtained from either Private PAIR or Public PAIR. Status information for unpublished applications is available through Private PAIR only. For more information about the PAIR system, see http://pair-direct.uspto.gov. Should you have questions on access to the Private PAIR system, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-flee). If you would like assistance from a USPTO Customer Service Representative or access to the automated information system, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /QUAZI FAROOQUI/ Primary Examiner, Art Unit 2491
Read full office action

Prosecution Timeline

Jul 12, 2024
Application Filed
Dec 28, 2025
Non-Final Rejection — §DP (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12597073
System, Method, and Computer Program Product for Patient Authentication and Identity Risk Assessment
2y 5m to grant Granted Apr 07, 2026
Patent 12587549
Information Security Using Blockchain Technology
2y 5m to grant Granted Mar 24, 2026
Patent 12585808
SYSTEMS AND METHODS FOR CONTENT BASED ACCESS CONTROL
2y 5m to grant Granted Mar 24, 2026
Patent 12587368
METHOD, APPARATUS, DEVICE AND STORAGE MEDIUM FOR DATA PROCESSING
2y 5m to grant Granted Mar 24, 2026
Patent 12580733
SECURE RE-USE OF PRIVATE KEY FOR DYNAMIC GROUP OF NODES
2y 5m to grant Granted Mar 17, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
83%
Grant Probability
98%
With Interview (+15.1%)
2y 8m
Median Time to Grant
Low
PTA Risk
Based on 448 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month