Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 17137479 | METHOD AND SYSTEM FOR INITIAL SECRET DELIVERY FOR SCALABLE AND RESTART-ABLE COLLOCATED CONTAINERS WITH SHARED RESOURCES | December 2020 | June 2023 | Allow | 30 | 1 | 0 | No | No |
| 17133588 | APPARATUS AND METHOD FOR WI-FI NETWORK PROFILE VERIFICATION | December 2020 | April 2024 | Allow | 40 | 1 | 0 | No | No |
| 17123100 | SYSTEMS, METHODS, AND APPARATUS FOR SECURITY KEY MANAGEMENT FOR I/O DEVICES | December 2020 | December 2023 | Allow | 36 | 3 | 0 | Yes | No |
| 17120146 | ANONYMITY MECHANISMS IN PERMISSIONED BLOCKCHAIN NETWORKS | December 2020 | January 2023 | Allow | 25 | 1 | 0 | Yes | No |
| 17116834 | DECENTRALIZED BROADCAST ENCRYPTION AND KEY GENERATION FACILITY | December 2020 | November 2023 | Allow | 36 | 4 | 0 | Yes | No |
| 17115903 | KEY IN LOCKBOX ENCRYPTED DATA DEDUPLICATION | December 2020 | August 2023 | Allow | 32 | 3 | 0 | Yes | No |
| 17114023 | USING KEYS FOR SELECTIVELY PREVENTING EXECUTION OF COMMANDS ON A DEVICE | December 2020 | October 2022 | Allow | 22 | 1 | 0 | No | No |
| 17101193 | SMART NETWORK INTERFACE CARD-BASED INLINE SECURE COMMUNICATION SERVICE | November 2020 | April 2024 | Allow | 41 | 5 | 0 | Yes | No |
| 17085506 | ENCRYPTION AT REST USING KMS AND TPM | October 2020 | March 2023 | Allow | 28 | 2 | 0 | No | No |
| 17069084 | APPARATUS AND METHOD FOR RECOVERING ENCRYPTION KEY BASED ON MEMORY ANALYSIS | October 2020 | September 2023 | Allow | 35 | 2 | 0 | No | No |
| 17063419 | DEVICE PROVISIONING USING DEDICATED CREDENTIAL STORAGE | October 2020 | October 2022 | Allow | 25 | 1 | 0 | No | No |
| 17061383 | METHOD AND APPARATUS FOR ELECTING REPRESENTATIVE NODE DEVICE, COMPUTER DEVICE, AND STORAGE MEDIUM | October 2020 | August 2023 | Allow | 34 | 1 | 0 | Yes | No |
| 16948689 | SECURE SOFTWARE INTERFACE | September 2020 | June 2023 | Allow | 32 | 3 | 0 | Yes | No |
| 17030781 | DISTRIBUTED SESSION RESUMPTION | September 2020 | December 2022 | Allow | 27 | 1 | 0 | Yes | No |
| 17041146 | METHOD OF SECURE COMMUNICATION AMONG PROTECTED CONTAINERS AND SYSTEM THEREOF | September 2020 | February 2023 | Allow | 29 | 2 | 0 | Yes | No |
| 17029521 | SECRET SEARCH DEVICE AND SECRET SEARCH METHOD | September 2020 | May 2022 | Allow | 20 | 1 | 0 | No | No |
| 17029394 | ITERATIVE CIPHER KEY-SCHEDULE CACHE FOR CACHING ROUND KEYS USED IN AN ITERATIVE ENCRYPTION/DECRYPTION SYSTEM AND RELATED METHODS | September 2020 | February 2023 | Abandon | 29 | 1 | 0 | No | No |
| 17022177 | Secure Public Cloud | September 2020 | May 2023 | Allow | 32 | 1 | 0 | No | No |
| 17003783 | STORAGE DEVICE AND CONTROLLING METHOD | August 2020 | October 2022 | Allow | 26 | 1 | 0 | No | No |
| 16986127 | CORRECTING PHYSICAL UNCLONABLE FUNCTION ERRORS BASED ON SHORT INTEGERS SOLUTIONS TO LATTICE PROBLEMS | August 2020 | June 2023 | Allow | 34 | 3 | 0 | No | No |
| 16964019 | TOKEN OFFLINE PROVISIONING | July 2020 | September 2022 | Allow | 31 | 1 | 0 | Yes | No |
| 16958611 | METHODS AND SYSTEMS FOR CRYPTOGRAPHIC IDENTITY BASED NETWORK MICROSEGMENTATION | June 2020 | February 2024 | Allow | 44 | 3 | 0 | Yes | Yes |
| 16910600 | SECURE RELIABLE TRUSTED EXECUTION ENVIRONMENTS | June 2020 | October 2022 | Allow | 27 | 1 | 0 | Yes | No |
| 16904806 | METHOD FOR GENERATING PUBLIC KEY AND SECRET KEY BASED ON MODULE-WAVY AND MODULE-LWR AND METHOD OF ENCRYPTION AND DECRYPTION USING THE KEYS | June 2020 | February 2023 | Allow | 32 | 2 | 0 | Yes | Yes |
| 16905897 | METHOD FOR IMPLEMENTATION OF POST-QUANTUM KEY EXCHANGE PROTOCOL AND APPLICATION THEREOF | June 2020 | March 2022 | Allow | 21 | 2 | 0 | No | No |
| 16903209 | PROTECTION OF THE EXECUTION OF CIPHER ALGORITHMS | June 2020 | April 2022 | Allow | 22 | 1 | 0 | No | No |
| 16772452 | QUANTUM PROTECTION OF TELEMETRY TRACKING AND COMMAND LINKS | June 2020 | January 2024 | Abandon | 43 | 4 | 0 | No | No |
| 16894941 | Security Token Expiration Using Signing Key Rotation | June 2020 | April 2022 | Allow | 22 | 2 | 0 | Yes | No |
| 16888897 | ENCRYPTION KEYS FOR REMOVABLE STORAGE MEDIA | June 2020 | January 2022 | Allow | 19 | 1 | 0 | No | No |
| 16885053 | SECURE DATA COMMUNICATION USING ELLIPTIC-CURVE DIFFIE-HELLMAN (ECDHE) KEY AGREEMENT | May 2020 | August 2022 | Allow | 27 | 2 | 0 | Yes | No |
| 16881584 | SECURE DEBUG OF FPGA DESIGN | May 2020 | April 2023 | Abandon | 35 | 4 | 0 | No | No |
| 16864152 | SECURE STORAGE AND USAGE OF CRYPTOGRAPHY KEYS | April 2020 | October 2021 | Allow | 18 | 0 | 0 | Yes | No |
| 16849401 | CACHE MANAGEMENT FOR ENCRYPTION KEY ROTATION | April 2020 | March 2022 | Allow | 23 | 1 | 0 | Yes | No |
| 16848982 | EFFICIENT DISTRIBUTED SECRET SHUFFLE PROTOCOL FOR ENCRYPTED DATABASE ENTRIES USING INDEPENDENT SHUFFLERS | April 2020 | January 2022 | Allow | 21 | 1 | 0 | No | No |
| 16846229 | PERFORMANCE STANDBY NODES FOR A SECURE STORAGE SYSTEM | April 2020 | February 2024 | Allow | 46 | 3 | 0 | No | No |
| 16828003 | INTEGRATION OF A BLOCK CHAIN, MANAGING GROUP AUTHORITY AND ACCESS IN AN ENTERPRISE ENVIRONMENT | March 2020 | February 2022 | Allow | 23 | 1 | 0 | Yes | No |
| 16828229 | ELASTIC LAUNCH FOR TRUSTED EXECUTION ENVIRONMENTS | March 2020 | December 2022 | Allow | 33 | 3 | 0 | Yes | No |
| 16816148 | DETERMINING KEY SERVER TYPE AND KEY SERVER REDUNDANCY INFORMATION TO ENABLE ENCRYPTION | March 2020 | March 2022 | Allow | 24 | 2 | 0 | Yes | No |
| 16805010 | DEVICE AND METHOD FOR GENERATING A KEY | February 2020 | March 2023 | Allow | 37 | 1 | 0 | No | No |
| 16802066 | SPLIT SECURITY FOR TRUSTED EXECUTION ENVIRONMENTS | February 2020 | September 2023 | Allow | 43 | 5 | 0 | Yes | No |
| 16795049 | HTTPS BOOT TO PROVIDE DECRYPTION KEY | February 2020 | November 2022 | Allow | 32 | 4 | 0 | No | No |
| 16794010 | SYSTEM AND METHOD FOR SELECTIVE TRANSPARENCY FOR PUBLIC LEDGERS | February 2020 | March 2022 | Allow | 25 | 2 | 0 | No | No |
| 16777973 | CALCULATION DEVICE FOR ENCRYPTION USING PUBLIC KEY AND ENCRYPTION METHOD THEREOF | January 2020 | January 2022 | Allow | 23 | 2 | 0 | Yes | No |
| 16775244 | REMOTE AUTHENTICATION FOR ACCESSING ON-PREMISES NETWORK DEVICES | January 2020 | October 2021 | Allow | 21 | 1 | 0 | Yes | No |
| 16749351 | AUTOMATICALLY REDACTING LOGS | January 2020 | March 2022 | Allow | 26 | 2 | 0 | Yes | No |
| 16738956 | RECOVERY KEY FOR UNLOCKING A DATA STORAGE DEVICE | January 2020 | November 2022 | Allow | 34 | 2 | 0 | Yes | No |
| 16728712 | METHOD AND APPARATUS FOR MULTI-KEY TOTAL MEMORY ENCRYPTION BASED ON DYNAMIC KEY DERIVATION | December 2019 | March 2023 | Abandon | 38 | 2 | 0 | No | No |
| 16723927 | MANAGEMENT OF KEYS FOR USE IN CRYPTOGRAPHIC COMPUTING | December 2019 | December 2021 | Allow | 24 | 1 | 0 | Yes | No |
| 16723977 | CRYPTOGRAPHIC ISOLATION OF MEMORY COMPARTMENTS IN A COMPUTING ENVIRONMENT | December 2019 | February 2022 | Allow | 25 | 1 | 0 | No | No |
| 16685624 | Methods and Systems For Cryptographic Private Key Management For Secure Multiparty Storage And Transfer Of Information | November 2019 | February 2022 | Allow | 27 | 1 | 0 | No | No |
| 16680787 | SYSTEMS AND METHODS FOR DISTRIBUTED KEY STORAGE | November 2019 | September 2021 | Allow | 22 | 1 | 0 | No | No |
| 16601329 | Data Deletion for a Multi-Tenant Environment | October 2019 | September 2023 | Allow | 47 | 6 | 0 | Yes | No |
| 16598909 | METHODS TO PROTECT NEURAL NETWORK MODELS | October 2019 | September 2022 | Allow | 36 | 1 | 0 | No | No |
| 16592188 | VIRTUAL MACHINE-BASED TRUSTED EXECUTION ENVIRONMENT | October 2019 | November 2021 | Allow | 25 | 1 | 0 | Yes | No |
| 16588889 | SYSTEM AND METHODS FOR SECURING ROLE CREDENTIALS | September 2019 | January 2024 | Allow | 52 | 6 | 0 | Yes | No |
| 16537054 | BLOCKCHAIN DIGEST AUGMENTATION OF GROUP-OF-PICTURES VIDEO STREAMS | August 2019 | December 2022 | Allow | 40 | 3 | 0 | Yes | No |
| 16530172 | ESTABLISHING TRUST ON A DATA STORAGE NETWORK | August 2019 | July 2022 | Allow | 35 | 3 | 0 | No | No |
| 16526464 | SYSTEM AND METHOD FOR SHREDDING A FORUM OF SECRETS | July 2019 | September 2021 | Allow | 25 | 1 | 0 | Yes | No |
| 16520996 | SECURE HASH ALGORITHM IMPLEMENTATION | July 2019 | February 2021 | Allow | 19 | 1 | 0 | Yes | No |
| 16520202 | PROVISIONING SYSTEMS AND METHODS | July 2019 | November 2021 | Allow | 28 | 1 | 0 | Yes | No |
| 16505743 | ADAPTIVE FILE ACCESS AUTHORIZATION USING PROCESS ACCESS PATTERNS | July 2019 | April 2021 | Allow | 21 | 0 | 0 | No | No |
| 16504453 | SHARING A SECRET BETWEEN AN ISOLATED DEVICE AND A NETWORK CONNECTED DEVICE | July 2019 | October 2021 | Allow | 27 | 1 | 0 | No | No |
| 16476196 | INACTIVE STATE SECURITY SUPPORT IN WIRELESS COMMUNICATIONS SYSTEM | July 2019 | August 2021 | Allow | 25 | 2 | 0 | Yes | No |
| 16454321 | Deterministic Encryption Key Rotation | June 2019 | May 2023 | Abandon | 47 | 4 | 0 | Yes | No |
| 16473107 | Distributed Blockchain-Based Method for Maintaining the Validity of a File | June 2019 | October 2022 | Allow | 40 | 3 | 0 | Yes | No |
| 16444582 | SYSTEM AND METHOD TO PROTECT DATA PRIVACY OF LIGHTWEIGHT DEVICES USING BLOCKCHAIN AND MULTI-PARTY COMPUTATION | June 2019 | July 2022 | Abandon | 37 | 3 | 0 | No | No |
| 16469486 | MATCHING SYSTEM, METHOD, APPARATUS, AND PROGRAM | June 2019 | April 2021 | Allow | 22 | 0 | 0 | Yes | No |
| 16418809 | METHOD AND SYSTEM FOR ANONYMIZING RAW SURGICAL PROCEDURE VIDEOS | May 2019 | March 2021 | Allow | 22 | 1 | 0 | Yes | No |
| 16462091 | CALCULATION DEVICE FOR ENCRYPTION USING PUBLIC KEY AND ENCRYPTION METHOD THEREOF | May 2019 | October 2022 | Allow | 41 | 4 | 0 | Yes | No |
| 16348417 | CIRCUIT CONCEALING APPARATUS, CALCULATION APPARATUS, AND PROGRAM | May 2019 | April 2021 | Allow | 23 | 1 | 0 | Yes | No |
| 16366101 | TRANSPARENT HIGH-PERFORMANCE DATA-AT-REST ENCRYPTION FOR PLATFORM-AS-A-SERVICE (PAAS) ENVIRONMENTS | March 2019 | May 2022 | Allow | 38 | 1 | 0 | No | No |
| 16263285 | Method and System for Fault Tolerant and Secure Multiparty Computation with SPDZ | January 2019 | August 2021 | Allow | 30 | 1 | 0 | No | No |
| 16257840 | SELECTIVE REAL-TIME CRYPTOGRAPHY IN A VEHICLE COMMUNICATION NETWORK | January 2019 | November 2021 | Allow | 34 | 2 | 0 | No | No |
| 16320805 | METHOD AND SYSTEM FOR ENCRYPTING FILES AND STORING THE ENCRYPTED FILES IN A STORAGE FILE SYSTEM | January 2019 | August 2021 | Abandon | 31 | 1 | 0 | No | No |
| 16254199 | CRYPTOASSET CUSTODIAL SYSTEM USING POWER DOWN OF HARDWARE TO PROTECT CRYPTOGRAPHIC KEYS | January 2019 | April 2022 | Allow | 39 | 1 | 0 | No | No |
| 16236450 | EFFICIENT ROTATE ADDER FOR IMPLEMENTING CRYPTOGRAPHIC BASIC OPERATIONS | December 2018 | July 2021 | Allow | 31 | 1 | 0 | No | No |
| 16232143 | TECHNOLOGIES FOR SECURE AUTHENTICATION AND PROGRAMMING OF ACCELERATOR DEVICES | December 2018 | March 2022 | Allow | 38 | 3 | 0 | Yes | No |
| 16309172 | METHOD FOR PROTECTING PDF DOCUMENT PAGE-BY-PAGE | December 2018 | March 2021 | Allow | 27 | 1 | 0 | No | No |
| 16216400 | USING DOMAINS FOR FLEXIBLE DATA ACCESS IN HETEROGENEOUS SYSTEM LANDSCAPES | December 2018 | March 2021 | Allow | 27 | 1 | 0 | No | No |
| 16215540 | Integrating Binary Inference Engines and Model Data for Efficiency of Inference Tasks | December 2018 | January 2023 | Allow | 49 | 4 | 0 | Yes | Yes |
| 16200016 | MULTIVARIATE QUADRATIC SIGNATURE SCHEME BASED ON CENTRAL MAP WITH OIL-OIL QUADRATIC TERMS SECURE AGAINST QUANTUM COMPUTERS | November 2018 | July 2021 | Allow | 32 | 1 | 0 | Yes | No |
| 16122398 | MALICIOUS ACTIVITY DETECTION BY CROSS-TRACE ANALYSIS AND DEEP LEARNING | September 2018 | April 2021 | Allow | 32 | 2 | 0 | Yes | No |
| 16114241 | Computer System and Method for Executing One or More Software Applications, Host Computer Device and Method for a Host Computer Device, Memory Device and Method for a Memory Device and Non-Transitory Computer Readable Medium | August 2018 | January 2021 | Allow | 29 | 1 | 0 | No | No |
| 15999422 | ACCESS CONTROL METHODS, ACCESS CONTROL DEVICES, AND COMPUTER READABLE MEDIA | August 2018 | September 2021 | Abandon | 37 | 1 | 0 | No | No |
| 16101635 | SYSTEM AND METHOD FOR ROUTING DATA WHEN EXECUTING QUERIES | August 2018 | February 2021 | Allow | 31 | 1 | 0 | No | No |
| 16101398 | MALICIOUS CLOUD-BASED RESOURCE ALLOCATION DETECTION | August 2018 | June 2021 | Allow | 35 | 2 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner PHAM, PHUC H.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 66.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner PHAM, PHUC H works in Art Unit 2434 and has examined 86 patent applications in our dataset. With an allowance rate of 90.7%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 31 months.
Examiner PHAM, PHUC H's allowance rate of 90.7% places them in the 75% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by PHAM, PHUC H receive 1.90 office actions before reaching final disposition. This places the examiner in the 42% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by PHAM, PHUC H is 31 months. This places the examiner in the 55% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +14.4% benefit to allowance rate for applications examined by PHAM, PHUC H. This interview benefit is in the 52% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 33.3% of applications are subsequently allowed. This success rate is in the 73% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 25.0% of cases where such amendments are filed. This entry rate is in the 35% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 66.7% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 55% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 89% percentile among all examiners. Of these withdrawals, 33.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 0.0% are granted (fully or in part). This grant rate is in the 2% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 18% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.