Prosecution Insights
Last updated: April 19, 2026
Application No. 19/300,557

Methods for Internet Communication Security

Final Rejection §DP
Filed
Aug 14, 2025
Examiner
GOODCHILD, WILLIAM J
Art Unit
2433
Tech Center
2400 — Computer Networks
Assignee
Stealthpath Inc.
OA Round
2 (Final)
83%
Grant Probability
Favorable
3-4
OA Rounds
3y 4m
To Grant
97%
With Interview

Examiner Intelligence

Grants 83% — above average
83%
Career Allow Rate
612 granted / 739 resolved
+24.8% vs TC avg
Moderate +14% lift
Without
With
+14.1%
Interview Lift
resolved cases with interview
Typical timeline
3y 4m
Avg Prosecution
18 currently pending
Career history
757
Total Applications
across all art units

Statute-Specific Performance

§101
10.1%
-29.9% vs TC avg
§103
51.0%
+11.0% vs TC avg
§102
18.4%
-21.6% vs TC avg
§112
11.4%
-28.6% vs TC avg
Black line = Tech Center average estimate • Based on career data from 739 resolved cases

Office Action

§DP
DETAILED ACTION Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Double Patenting Claims 1-30 are provisionally rejected on the ground of nonstatutory double patenting as being unpatentable over claims 1-30 of copending Application No. 19/300525 (reference application). Although the claims at issue are not identical, they are not patentably distinct from each other because similar limitations within the independent claim. This is a provisional nonstatutory double patenting rejection because the patentably indistinct claims have not in fact been patented. 19/300557 19/300525 1. A product for securing communications of a plurality of networked computing devices, the product comprising a non-transitory computer-readable storage medium having computer-readable program code embodied therein, the computer-readable program code executable by a processor to perform communication management operations, the communication management operations comprising: i) intercepting a first network packet to obtain a first payload with a higher- than-OSI layer three portion and a destination port number, the destination port number assigned to a destination port on one of the plurality of networked computing devices; ii) confirming from the higher-than-OSI layer three portion of the first payload that the first payload conforms to at least one of a data model pre-assigned to the destination port number; iii) after confirmation that the first payload conforms to the data model for the destination port, forming a second network packet comprising a second payload, and at least one of a local program identification code, and a data model identification code; and iv) executing at least one instruction to send the second network packet to network security software on the destination port on the one of the plurality of networked computing devices via a zero-trust network access (ZTNA). 1. A product for securing communications of a plurality of networked computing devices, the product comprising a non-transitory computer-readable storage medium having computer-readable program code embodied therein, the computer-readable program code executable by a processor to perform communication management operations, the communication management operations comprising: i) intercepting a first network packet at a hypervisor to obtain a first payload with a higher-than-OSI layer three portion and a destination port number, the destination port number assigned to a destination port on one of the plurality of networked computing devices; ii) decrypting, with a single-use cryptographic key, at least a portion of the first higher-than-OSI layer three portion of the first payload to obtain one or more first packet parameters; iii) confirming at the hypervisor that the first payload conforms to at least one of a data model pre-assigned to the destination port number based on a comparison of the one or more first packet parameters with one or more first expected values; iv) after confirmation that the first payload conforms to the data model for the destination port, forming a second network packet comprising a second payload and at least one of a local program identification code or a data model identification code; and v) executing at least one instruction to send the second network packet to network security software on the destination port on the one of the plurality of networked computing devices via a zero-trust network access (ZTNA). Response to Arguments Applicant’s arguments, see remarks, filed 03/18/2026, with respect to claims 1-30 have been fully considered and are persuasive. The rejections / objections of claims 1-30 has been withdrawn. From IDS of 03/18/2026 an Obvious Type Double Patenting Rejection is being made to application number 19/300525. Conclusion THIS ACTION IS MADE FINAL. Applicant is reminded of the extension of time policy as set forth in 37 CFR 1.136(a). A shortened statutory period for reply to this final action is set to expire THREE MONTHS from the mailing date of this action. In the event a first reply is filed within TWO MONTHS of the mailing date of this final action and the advisory action is not mailed until after the end of the THREE-MONTH shortened statutory period, then the shortened statutory period will expire on the date the advisory action is mailed, and any nonprovisional extension fee (37 CFR 1.17(a)) pursuant to 37 CFR 1.136(a) will be calculated from the mailing date of the advisory action. In no event, however, will the statutory period for reply expire later than SIX MONTHS from the mailing date of this final action. Any inquiry concerning this communication or earlier communications from the examiner should be directed to WILLIAM J GOODCHILD whose telephone number is (571)270-1589. The examiner can normally be reached M-F 8am-4:30pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Jeff Pwu can be reached at 571-272-6798. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /William J. Goodchild/Primary Examiner, Art Unit 2433
Read full office action

Prosecution Timeline

Aug 14, 2025
Application Filed
Dec 09, 2025
Non-Final Rejection — §DP
Mar 18, 2026
Response Filed
Mar 30, 2026
Final Rejection — §DP (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12591666
DETECTING MODEL INVERSION ATTACKS IN FEDERATED LEARNING
2y 5m to grant Granted Mar 31, 2026
Patent 12587551
TECHNIQUES FOR MONITORING PRIVILEGED USERS AND DETECTING ANOMALOUS ACTIVITIES IN A COMPUTING ENVIRONMENT
2y 5m to grant Granted Mar 24, 2026
Patent 12580925
DETERMINING SECURITY RISKS ASSOCIATED WITH AN ACCESS DESIGN BASED ON ACCESS HEALTH SCORES
2y 5m to grant Granted Mar 17, 2026
Patent 12574355
Zero Trust Network Access and Virtual Private Network Client Offloading
2y 5m to grant Granted Mar 10, 2026
Patent 12574248
METHOD FOR VERIFYING DIGITAL SIGNATURES, VEHICLE COMPUTING UNIT AND VEHICLE
2y 5m to grant Granted Mar 10, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

3-4
Expected OA Rounds
83%
Grant Probability
97%
With Interview (+14.1%)
3y 4m
Median Time to Grant
Moderate
PTA Risk
Based on 739 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month