USPTO Examiner PHAM PHUC H - Art Unit 2434

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
17137479METHOD AND SYSTEM FOR INITIAL SECRET DELIVERY FOR SCALABLE AND RESTART-ABLE COLLOCATED CONTAINERS WITH SHARED RESOURCESDecember 2020June 2023Allow3010NoNo
17133588APPARATUS AND METHOD FOR WI-FI NETWORK PROFILE VERIFICATIONDecember 2020April 2024Allow4010NoNo
17123100SYSTEMS, METHODS, AND APPARATUS FOR SECURITY KEY MANAGEMENT FOR I/O DEVICESDecember 2020December 2023Allow3630YesNo
17120146ANONYMITY MECHANISMS IN PERMISSIONED BLOCKCHAIN NETWORKSDecember 2020January 2023Allow2510YesNo
17116834DECENTRALIZED BROADCAST ENCRYPTION AND KEY GENERATION FACILITYDecember 2020November 2023Allow3640YesNo
17115903KEY IN LOCKBOX ENCRYPTED DATA DEDUPLICATIONDecember 2020August 2023Allow3230YesNo
17114023USING KEYS FOR SELECTIVELY PREVENTING EXECUTION OF COMMANDS ON A DEVICEDecember 2020October 2022Allow2210NoNo
17101193SMART NETWORK INTERFACE CARD-BASED INLINE SECURE COMMUNICATION SERVICENovember 2020April 2024Allow4150YesNo
17085506ENCRYPTION AT REST USING KMS AND TPMOctober 2020March 2023Allow2820NoNo
17069084APPARATUS AND METHOD FOR RECOVERING ENCRYPTION KEY BASED ON MEMORY ANALYSISOctober 2020September 2023Allow3520NoNo
17063419DEVICE PROVISIONING USING DEDICATED CREDENTIAL STORAGEOctober 2020October 2022Allow2510NoNo
17061383METHOD AND APPARATUS FOR ELECTING REPRESENTATIVE NODE DEVICE, COMPUTER DEVICE, AND STORAGE MEDIUMOctober 2020August 2023Allow3410YesNo
16948689SECURE SOFTWARE INTERFACESeptember 2020June 2023Allow3230YesNo
17030781DISTRIBUTED SESSION RESUMPTIONSeptember 2020December 2022Allow2710YesNo
17041146METHOD OF SECURE COMMUNICATION AMONG PROTECTED CONTAINERS AND SYSTEM THEREOFSeptember 2020February 2023Allow2920YesNo
17029521SECRET SEARCH DEVICE AND SECRET SEARCH METHODSeptember 2020May 2022Allow2010NoNo
17029394ITERATIVE CIPHER KEY-SCHEDULE CACHE FOR CACHING ROUND KEYS USED IN AN ITERATIVE ENCRYPTION/DECRYPTION SYSTEM AND RELATED METHODSSeptember 2020February 2023Abandon2910NoNo
17022177Secure Public CloudSeptember 2020May 2023Allow3210NoNo
17003783STORAGE DEVICE AND CONTROLLING METHODAugust 2020October 2022Allow2610NoNo
16986127CORRECTING PHYSICAL UNCLONABLE FUNCTION ERRORS BASED ON SHORT INTEGERS SOLUTIONS TO LATTICE PROBLEMSAugust 2020June 2023Allow3430NoNo
16964019TOKEN OFFLINE PROVISIONINGJuly 2020September 2022Allow3110YesNo
16958611METHODS AND SYSTEMS FOR CRYPTOGRAPHIC IDENTITY BASED NETWORK MICROSEGMENTATIONJune 2020February 2024Allow4430YesYes
16910600SECURE RELIABLE TRUSTED EXECUTION ENVIRONMENTSJune 2020October 2022Allow2710YesNo
16904806METHOD FOR GENERATING PUBLIC KEY AND SECRET KEY BASED ON MODULE-WAVY AND MODULE-LWR AND METHOD OF ENCRYPTION AND DECRYPTION USING THE KEYSJune 2020February 2023Allow3220YesYes
16905897METHOD FOR IMPLEMENTATION OF POST-QUANTUM KEY EXCHANGE PROTOCOL AND APPLICATION THEREOFJune 2020March 2022Allow2120NoNo
16903209PROTECTION OF THE EXECUTION OF CIPHER ALGORITHMSJune 2020April 2022Allow2210NoNo
16772452QUANTUM PROTECTION OF TELEMETRY TRACKING AND COMMAND LINKSJune 2020January 2024Abandon4340NoNo
16894941Security Token Expiration Using Signing Key RotationJune 2020April 2022Allow2220YesNo
16888897ENCRYPTION KEYS FOR REMOVABLE STORAGE MEDIAJune 2020January 2022Allow1910NoNo
16885053SECURE DATA COMMUNICATION USING ELLIPTIC-CURVE DIFFIE-HELLMAN (ECDHE) KEY AGREEMENTMay 2020August 2022Allow2720YesNo
16881584SECURE DEBUG OF FPGA DESIGNMay 2020April 2023Abandon3540NoNo
16864152SECURE STORAGE AND USAGE OF CRYPTOGRAPHY KEYSApril 2020October 2021Allow1800YesNo
16849401CACHE MANAGEMENT FOR ENCRYPTION KEY ROTATIONApril 2020March 2022Allow2310YesNo
16848982EFFICIENT DISTRIBUTED SECRET SHUFFLE PROTOCOL FOR ENCRYPTED DATABASE ENTRIES USING INDEPENDENT SHUFFLERSApril 2020January 2022Allow2110NoNo
16846229PERFORMANCE STANDBY NODES FOR A SECURE STORAGE SYSTEMApril 2020February 2024Allow4630NoNo
16828003INTEGRATION OF A BLOCK CHAIN, MANAGING GROUP AUTHORITY AND ACCESS IN AN ENTERPRISE ENVIRONMENTMarch 2020February 2022Allow2310YesNo
16828229ELASTIC LAUNCH FOR TRUSTED EXECUTION ENVIRONMENTSMarch 2020December 2022Allow3330YesNo
16816148DETERMINING KEY SERVER TYPE AND KEY SERVER REDUNDANCY INFORMATION TO ENABLE ENCRYPTIONMarch 2020March 2022Allow2420YesNo
16805010DEVICE AND METHOD FOR GENERATING A KEYFebruary 2020March 2023Allow3710NoNo
16802066SPLIT SECURITY FOR TRUSTED EXECUTION ENVIRONMENTSFebruary 2020September 2023Allow4350YesNo
16795049HTTPS BOOT TO PROVIDE DECRYPTION KEYFebruary 2020November 2022Allow3240NoNo
16794010SYSTEM AND METHOD FOR SELECTIVE TRANSPARENCY FOR PUBLIC LEDGERSFebruary 2020March 2022Allow2520NoNo
16777973CALCULATION DEVICE FOR ENCRYPTION USING PUBLIC KEY AND ENCRYPTION METHOD THEREOFJanuary 2020January 2022Allow2320YesNo
16775244REMOTE AUTHENTICATION FOR ACCESSING ON-PREMISES NETWORK DEVICESJanuary 2020October 2021Allow2110YesNo
16749351AUTOMATICALLY REDACTING LOGSJanuary 2020March 2022Allow2620YesNo
16738956RECOVERY KEY FOR UNLOCKING A DATA STORAGE DEVICEJanuary 2020November 2022Allow3420YesNo
16728712METHOD AND APPARATUS FOR MULTI-KEY TOTAL MEMORY ENCRYPTION BASED ON DYNAMIC KEY DERIVATIONDecember 2019March 2023Abandon3820NoNo
16723927MANAGEMENT OF KEYS FOR USE IN CRYPTOGRAPHIC COMPUTINGDecember 2019December 2021Allow2410YesNo
16723977CRYPTOGRAPHIC ISOLATION OF MEMORY COMPARTMENTS IN A COMPUTING ENVIRONMENTDecember 2019February 2022Allow2510NoNo
16685624Methods and Systems For Cryptographic Private Key Management For Secure Multiparty Storage And Transfer Of InformationNovember 2019February 2022Allow2710NoNo
16680787SYSTEMS AND METHODS FOR DISTRIBUTED KEY STORAGENovember 2019September 2021Allow2210NoNo
16601329Data Deletion for a Multi-Tenant EnvironmentOctober 2019September 2023Allow4760YesNo
16598909METHODS TO PROTECT NEURAL NETWORK MODELSOctober 2019September 2022Allow3610NoNo
16592188VIRTUAL MACHINE-BASED TRUSTED EXECUTION ENVIRONMENTOctober 2019November 2021Allow2510YesNo
16588889SYSTEM AND METHODS FOR SECURING ROLE CREDENTIALSSeptember 2019January 2024Allow5260YesNo
16537054BLOCKCHAIN DIGEST AUGMENTATION OF GROUP-OF-PICTURES VIDEO STREAMSAugust 2019December 2022Allow4030YesNo
16530172ESTABLISHING TRUST ON A DATA STORAGE NETWORKAugust 2019July 2022Allow3530NoNo
16526464SYSTEM AND METHOD FOR SHREDDING A FORUM OF SECRETSJuly 2019September 2021Allow2510YesNo
16520996SECURE HASH ALGORITHM IMPLEMENTATIONJuly 2019February 2021Allow1910YesNo
16520202PROVISIONING SYSTEMS AND METHODSJuly 2019November 2021Allow2810YesNo
16505743ADAPTIVE FILE ACCESS AUTHORIZATION USING PROCESS ACCESS PATTERNSJuly 2019April 2021Allow2100NoNo
16504453SHARING A SECRET BETWEEN AN ISOLATED DEVICE AND A NETWORK CONNECTED DEVICEJuly 2019October 2021Allow2710NoNo
16476196INACTIVE STATE SECURITY SUPPORT IN WIRELESS COMMUNICATIONS SYSTEMJuly 2019August 2021Allow2520YesNo
16454321Deterministic Encryption Key RotationJune 2019May 2023Abandon4740YesNo
16473107Distributed Blockchain-Based Method for Maintaining the Validity of a FileJune 2019October 2022Allow4030YesNo
16444582SYSTEM AND METHOD TO PROTECT DATA PRIVACY OF LIGHTWEIGHT DEVICES USING BLOCKCHAIN AND MULTI-PARTY COMPUTATIONJune 2019July 2022Abandon3730NoNo
16469486MATCHING SYSTEM, METHOD, APPARATUS, AND PROGRAMJune 2019April 2021Allow2200YesNo
16418809METHOD AND SYSTEM FOR ANONYMIZING RAW SURGICAL PROCEDURE VIDEOSMay 2019March 2021Allow2210YesNo
16462091CALCULATION DEVICE FOR ENCRYPTION USING PUBLIC KEY AND ENCRYPTION METHOD THEREOFMay 2019October 2022Allow4140YesNo
16348417CIRCUIT CONCEALING APPARATUS, CALCULATION APPARATUS, AND PROGRAMMay 2019April 2021Allow2310YesNo
16366101TRANSPARENT HIGH-PERFORMANCE DATA-AT-REST ENCRYPTION FOR PLATFORM-AS-A-SERVICE (PAAS) ENVIRONMENTSMarch 2019May 2022Allow3810NoNo
16263285Method and System for Fault Tolerant and Secure Multiparty Computation with SPDZJanuary 2019August 2021Allow3010NoNo
16257840SELECTIVE REAL-TIME CRYPTOGRAPHY IN A VEHICLE COMMUNICATION NETWORKJanuary 2019November 2021Allow3420NoNo
16320805METHOD AND SYSTEM FOR ENCRYPTING FILES AND STORING THE ENCRYPTED FILES IN A STORAGE FILE SYSTEMJanuary 2019August 2021Abandon3110NoNo
16254199CRYPTOASSET CUSTODIAL SYSTEM USING POWER DOWN OF HARDWARE TO PROTECT CRYPTOGRAPHIC KEYSJanuary 2019April 2022Allow3910NoNo
16236450EFFICIENT ROTATE ADDER FOR IMPLEMENTING CRYPTOGRAPHIC BASIC OPERATIONSDecember 2018July 2021Allow3110NoNo
16232143TECHNOLOGIES FOR SECURE AUTHENTICATION AND PROGRAMMING OF ACCELERATOR DEVICESDecember 2018March 2022Allow3830YesNo
16309172METHOD FOR PROTECTING PDF DOCUMENT PAGE-BY-PAGEDecember 2018March 2021Allow2710NoNo
16216400USING DOMAINS FOR FLEXIBLE DATA ACCESS IN HETEROGENEOUS SYSTEM LANDSCAPESDecember 2018March 2021Allow2710NoNo
16215540Integrating Binary Inference Engines and Model Data for Efficiency of Inference TasksDecember 2018January 2023Allow4940YesYes
16200016MULTIVARIATE QUADRATIC SIGNATURE SCHEME BASED ON CENTRAL MAP WITH OIL-OIL QUADRATIC TERMS SECURE AGAINST QUANTUM COMPUTERSNovember 2018July 2021Allow3210YesNo
16122398MALICIOUS ACTIVITY DETECTION BY CROSS-TRACE ANALYSIS AND DEEP LEARNINGSeptember 2018April 2021Allow3220YesNo
16114241Computer System and Method for Executing One or More Software Applications, Host Computer Device and Method for a Host Computer Device, Memory Device and Method for a Memory Device and Non-Transitory Computer Readable MediumAugust 2018January 2021Allow2910NoNo
15999422ACCESS CONTROL METHODS, ACCESS CONTROL DEVICES, AND COMPUTER READABLE MEDIAAugust 2018September 2021Abandon3710NoNo
16101635SYSTEM AND METHOD FOR ROUTING DATA WHEN EXECUTING QUERIESAugust 2018February 2021Allow3110NoNo
16101398MALICIOUS CLOUD-BASED RESOURCE ALLOCATION DETECTIONAugust 2018June 2021Allow3520NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner PHAM, PHUC H.

Strategic Value of Filing an Appeal

Total Appeal Filings
3
Allowed After Appeal Filing
2
(66.7%)
Not Allowed After Appeal Filing
1
(33.3%)
Filing Benefit Percentile
90.9%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 66.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner PHAM, PHUC H - Prosecution Strategy Guide

Executive Summary

Examiner PHAM, PHUC H works in Art Unit 2434 and has examined 86 patent applications in our dataset. With an allowance rate of 90.7%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 31 months.

Allowance Patterns

Examiner PHAM, PHUC H's allowance rate of 90.7% places them in the 75% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by PHAM, PHUC H receive 1.90 office actions before reaching final disposition. This places the examiner in the 42% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by PHAM, PHUC H is 31 months. This places the examiner in the 55% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +14.4% benefit to allowance rate for applications examined by PHAM, PHUC H. This interview benefit is in the 52% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 33.3% of applications are subsequently allowed. This success rate is in the 73% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 25.0% of cases where such amendments are filed. This entry rate is in the 35% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 66.7% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 55% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 89% percentile among all examiners. Of these withdrawals, 33.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.

Petition Practice

When applicants file petitions regarding this examiner's actions, 0.0% are granted (fully or in part). This grant rate is in the 2% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 18% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Appeal filing as negotiation tool: This examiner frequently reconsiders rejections during the appeal process. Filing a Notice of Appeal may prompt favorable reconsideration during the mandatory appeal conference.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.