USPTO Examiner GAO SHU CHUN - Art Unit 2437

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18714541KEY MANAGEMENT METHOD, KEY MANAGEMENT DEVICE AND STORAGE MEDIUMMay 2024March 2025Allow1010NoNo
18528320Secure Web Container for a Secure Online User EnvironmentDecember 2023October 2024Allow1110YesNo
18228468DISPOSABLE BROWSERS AND AUTHENTICATION TECHNIQUES FOR A SECURE ONLINE USER ENVIRONMENTJuly 2023September 2024Allow1310NoNo
18209789Hardware Component Monitoring-based Performance of a Remedial ActionJune 2023June 2025Abandon2410YesNo
18121413INTERNET OF THINGS SECURITY SYSTEMMarch 2023July 2024Allow1610YesNo
18161445SYSTEM AND METHOD FOR AUTOMATICALLY DETECTING A SECURITY VULNERABILITY IN A SOURCE CODE USING A MACHINE LEARNING MODELJanuary 2023June 2024Allow1610NoNo
18160116SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR SOFTWARE DEFINED STORAGE SECURITY PROTECTIONJanuary 2023August 2024Allow1910NoNo
18150470CONNECTING A CLOUD NETWORK TO THE INTERNETJanuary 2023January 2025Abandon2410NoNo
18150488CONNECTING A CLOUD NETWORK TO THE INTERNETJanuary 2023January 2025Abandon2410NoNo
18069146SECURITY EVENTS GRAPH FOR ALERT PRIORITIZATIONDecember 2022February 2024Allow1410NoNo
18072526SYSTEM FOR DETECTION AND CLASSIFICATION OF INTRUSION USING MACHINE LEARNING TECHNIQUESNovember 2022February 2024Allow1510NoNo
17992681Enforcing Trusted Application Settings for Shared Code LibrariesNovember 2022February 2024Allow1510NoNo
17970790IDENTIFYING PERSONALIZED OR ALTERED WEBPAGE CONTENT USING A BROWSER EXTENSION TOOLOctober 2022April 2025Allow2910NoNo
17949806METHODS, SYSTEMS, AND APPARATUSES FOR IMPROVED MULTI-FACTOR AUTHENTICATION IN A MULTI-APP COMMUNICATION SYSTEMSeptember 2022August 2024Allow2320YesNo
17932911THREAT SCORE PREDICTION MODELSeptember 2022February 2024Allow1710NoNo
17814410SYSTEMS AND METHODS FOR APPLYING ATTESTATION TOKENS TO LISP MESSAGESJuly 2022July 2024Allow2310YesNo
17867780METHODS AND ARRANGEMENTS FOR MULTI-LAYER IN-VEHICLE NETWORK INTRUSION DETECTION AND CHARACTERIZATIONJuly 2022March 2024Allow2010NoNo
17843707Securing an Anomaly Detection System for Microservice-Based ApplicationsJune 2022April 2025Abandon3410NoNo
17676755SYSTEM AND METHOD FOR ASSOCIATING CYBERSECURITY INTELLIGENCE TO CYBERTHREAT ACTORS THROUGH A SIMILARITY MATRIXFebruary 2022March 2024Allow2510NoNo
17587512AUTOMATIC MICROGATEWAY TAXONOMY TAGSJanuary 2022March 2025Allow3820YesNo
17580910METHOD AND SYSTEM FOR A CONDITIONAL KEY STORAGE USING NETWORK INFORMATION OF A KEY MANAGEMENT SERVICEJanuary 2022March 2025Allow3720YesNo
17578574Method and Apparatus for Detecting the Occurrence of a Ransomware Attack on a Storage VolumeJanuary 2022January 2025Allow3621YesNo
17570354TIERING TO GROUP AND ACCESS CONTROL CLOUD NATIVE SECURITY POLICIESJanuary 2022December 2024Abandon3510NoNo
17562421ONGOING AND ON-DEMAND SECURE VERIFICATION OF AUDIT COMPLIANCEDecember 2021October 2023Allow2210NoNo
17503177CONNECTING A CLOUD NETWORK TO THE INTERNETOctober 2021June 2024Abandon3210NoNo
17493364CYBERSECURITY INVESTIGATION TOOLS UTILIZING INFORMATION GRAPHSOctober 2021March 2024Allow2910YesNo
17449537GENERATING ATTACK GRAPHS IN AGILE SECURITY PLATFORMSSeptember 2021September 2023Allow2410NoNo
17447813CONTENT BASED SECURITY REQUIREMENTSSeptember 2021April 2025Allow4330NoNo
17404759DETECTING VEHICLE MALFUNCTIONS AND CYBER ATTACKS USING MACHINE LEARNINGAugust 2021March 2024Allow3120YesNo
17393334CENTRALIZED REQUEST PROCESSING AND SECURITY ZONE POLICY ENFORCEMENT IN A CLOUD INFRASTRUCTURE SYSTEMAugust 2021November 2024Allow4030YesNo
17389695ENDPOINT AGENT MANAGEMENT SYSTEMS AND METHODS FOR REMOTE ENDPOINT SECURITYJuly 2021March 2024Allow3220YesNo
17375419CREATION OF GENERALIZED CODE TEMPLATES TO PROTECT WEB APPLICATION COMPONENTSJuly 2021February 2024Abandon3110NoNo
17373415IDENTIFYING MALWARE BASED ON SYSTEM API FUNCTION POINTERSJuly 2021October 2024Allow3930YesNo
17357549SYSTEM AND METHOD FOR SECURE MULTITENANT OPERATIONS OF A DISTRIBUTED COMPUTING CLUSTERJune 2021February 2024Allow3220NoNo
17353196Secure Web Container for a Secure Online User EnvironmentJune 2021July 2023Allow2410NoNo
17304200GENERATING A NETWORK SECURITY POLICY BASED ON A USER IDENTITY ASSOCIATED WITH MALICIOUS BEHAVIORJune 2021September 2023Allow2710YesNo
17349258COMPUTER SECURITY USING ACTIVITY AND CONTENT SEGREGATIONJune 2021February 2024Abandon3210NoNo
17338611Dynamic, Runtime Application Programming Interface Parameter Labeling, Flow Parameter Tracking and Security Policy Enforcement Using API Call GraphJune 2021October 2023Allow2810NoNo
17333454VALIDATING COMPLIANCE OF ROLES WITH ACCESS PERMISSIONSMay 2021June 2023Allow2400NoNo
17333469EVALUATION OF EFFECTIVE ACCESS PERMISSIONS IN IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEMSMay 2021July 2024Allow3720YesNo
17303444IDENTIFYING ACCOUNTS HAVING SHARED CREDENTIALSMay 2021May 2023Allow2410NoNo
17329107SYSTEMS, METHODS, AND STORAGE MEDIA FOR ABSTRACTION AND ENFORCEMENT IN AN IDENTITY INFRASTRUCTUREMay 2021October 2023Allow2910NoNo
17326691SYSTEMS AND METHODS FOR NETWORK SECURITYMay 2021October 2023Allow2910YesNo
17245943FRAMEWORK FOR CUSTOMER CONTROL AND AUDITING OF OPERATOR ACCESS TO INFRASTRUCTURE IN A CLOUD SERVICEApril 2021November 2023Allow3120NoNo
17236942AUTOMATED CONTEXTUAL UNDERSTANDING OF UNSTRUCTURED SECURITY DOCUMENTSApril 2021October 2023Allow3020YesNo
17232999DETECTING COMPROMISED CREDENTIALS IN A CREDENTIAL STUFFING ATTACKApril 2021June 2024Allow3830NoNo
17225765SYSTEM AND METHOD FOR DYNAMICALLY NEUTRALIZING MALICIOUS ONES OF COMMUNICATING ELECTRONIC DEVICESApril 2021April 2023Allow2410NoNo
17221570Content-Based Application Security for Distributed Computing SystemApril 2021September 2023Allow2910NoNo
17216845FRICTIONLESS SUPPLEMENTARY MULTI-FACTOR AUTHENTICATION FOR SENSITIVE TRANSACTIONS WITHIN AN APPLICATION SESSIONMarch 2021June 2024Allow3830YesNo
17198924AMBIENT SOUNDS-BASED AUTHENTICATION METHOD AND SYSTEMMarch 2021March 2024Allow3630YesNo
17186412APPLICATION PROGRAMMING INTERFACE (API) DOMAIN SPECIFIC LANGUAGEFebruary 2021February 2024Allow3620NoNo
17181608SYSTEM FOR DETECTION AND CLASSIFICATION OF INTRUSION USING MACHINE LEARNING TECHNIQUESFebruary 2021November 2022Allow2110NoNo
17166925SYSTEMS AND METHODS FOR PROTECTING DATA ON DEVICESFebruary 2021July 2023Allow2910YesNo
17162769Methods and Systems for Accurately Assessing Application Access RiskJanuary 2021July 2023Allow2910NoNo
17160881SYSTEMS AND METHODS TO CONTROL DATA ACCESS AND USAGEJanuary 2021March 2023Allow2610NoNo
17160053Machine Learning-based Hardware Component MonitoringJanuary 2021March 2023Allow2610NoNo
17148684RAPID INITIAL DEPLOYMENT DATABASE SECURITY MODELJanuary 2021April 2024Allow3930YesNo
17142671INTERCEPTING REPORTS OF HARMFUL E-MAILS THAT ARE REPORTED TO AN AUTHORITYJanuary 2021March 2023Allow2610NoNo
17118054POWER DETECTION FOR IDENTIFYING SUSPICIOUS DEVICESDecember 2020January 2023Allow2500NoNo
17112366METHOD AND APPARATUS FOR GENERATING AND PROVIDING A TEMPORARY PASSWORD TO CONTROL ACCESS TO A RECORD CREATED IN RESPONSE TO AN ELECTRONIC MESSAGEDecember 2020March 2023Allow2710NoNo
17107082Forecast-Based Permissions RecommendationsNovember 2020January 2023Allow2610NoNo
17080833Disposable Browsers and Authentication Techniques for a Secure Online User EnvironmentOctober 2020March 2023Allow2810NoNo
17070930Enforcing Trusted Application Settings for Shared Code LibrariesOctober 2020November 2022Allow2510NoNo
17064552PROCESSOR THAT MITIGATES SIDE CHANNEL ATTACKS BY PREVENTS CACHE LINE DATA IMPLICATED BY A MISSING LOAD ADDRESS FROM BEING FILLED INTO A DATA CACHE MEMORY WHEN THE LOAD ADDRESS SPECIFIES A LOCATION WITH NO VALID ADDRESS TRANSLATION OR NO PERMISSION TO READ FROM THE LOCATIONOctober 2020June 2023Allow3210YesNo
17034714INTERNET OF THINGS SECURITY SYSTEMSeptember 2020January 2023Allow2810NoNo
17029802Lightweight Secure Autonomic Control PlaneSeptember 2020January 2023Allow2710NoNo
16948399NETWORK SECURITY ORCHESTRATION AND MANAGEMENT ACROSS DIFFERENT CLOUDSSeptember 2020July 2024Allow4630YesNo
16981219Trusted Execution Security Policy PlatformSeptember 2020August 2023Allow3520YesNo
17005478SYSTEMS AND METHODS FOR COUNTERING REMOVAL OF DIGITAL FORENSICS INFORMATION BY MALICIOUS SOFTWAREAugust 2020December 2022Allow2810NoNo
16944945METHOD FOR ATTACK PROTECTION IN IOT DEVICESJuly 2020February 2023Allow3010NoNo
16946088DATA STORAGE SYSTEM WITH POWERED MOVE ATTACK PROTECTIONJune 2020November 2022Allow2910NoNo
16883022METHOD AND SYSTEM FOR DATA SECURITY AND APPARATUS FOR EXECUTING THE SAMEMay 2020November 2022Allow2910NoNo
16864395METHODS FOR PROVISIONING UNIVERSAL INTEGRATED CIRCUIT CARDSMay 2020September 2020Allow500YesNo
16760217INFORMATION PROCESSING APPARATUS, MOVING APPARATUS, AND METHODApril 2020October 2022Allow2910NoNo
16858779DATA INTEGRATION SYSTEM FOR TRIGGERING ANALYSIS OF CONNECTION OSCILLATIONSApril 2020September 2020Allow500YesNo
16755465Vehicular Control ApparatusApril 2020November 2022Allow3210NoNo
16838054Validating the Use of User Credentials in a Penetration Testing CampaignApril 2020October 2021Allow1800NoNo
16828612REVERSE PROXY SERVERS FOR IMPLEMENTING APPLICATION LAYER-BASED AND TRANSPORT LAYER-BASED SECURITY RULESMarch 2020July 2023Allow4020YesNo
16787552END USER SECURITY MANAGERFebruary 2020September 2022Allow3120YesNo
16777187SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR SOFTWARE DEFINED STORAGE SECURITY PROTECTIONJanuary 2020October 2022Allow3310NoNo
16634551METHOD FOR ACQURING MAIL BOX ACCOUNT IN SYSTEMJanuary 2020March 2023Allow3720NoNo
16746237METHOD, SYSTEM AND APPARATUS FOR NFC SECURITYJanuary 2020June 2021Allow1710YesNo
16735700Enforcing Trusted Application Settings for Shared Code LibrariesJanuary 2020September 2020Allow800YesNo
16729133ARTIFICIAL INTELLIGENCE (AI) ASSISTED ANOMALY DETECTION OF INTRUSION IN STORAGE SYSTEMSDecember 2019July 2022Allow3010YesNo
16727565METHODS AND ARRANGEMENTS FOR MULTI-LAYER IN-VEHICLE NETWORK INTRUSION DETECTION AND CHARACTERIZATIONDecember 2019April 2022Allow2810NoNo
16725401BIOMETRIC CLOUD AUTHENTICATION GATEWAY DATABASE SYSTEM AND METHOD OF USEDecember 2019May 2022Allow2940YesNo
16711819Ransomware Detection and MitigationDecember 2019August 2022Allow3320YesNo
16699112CLIENT AUTHENTICATION MANAGEMENT BASED UPON MODELINGNovember 2019August 2022Allow3210YesNo
16688846CONNECTING A CLOUD NETWORK TO THE INTERNETNovember 2019July 2021Allow2010YesNo
16589489KEY THROTTLING TO MITIGATE UNAUTHORIZED FILE ACCESSOctober 2019December 2020Allow1500YesNo
16583321CONTAINER INDEPENDENT SECURE FILE SYSTEM FOR SECURITY APPLICATION CONTAINERSSeptember 2019June 2021Allow2110YesNo
16576006IDENTIFYING ACCOUNTS HAVING SHARED CREDENTIALSSeptember 2019April 2021Allow1810YesNo
16574771SYSTEMS AND METHODS FOR APPLYING ATTESTATION TOKENS TO LISP MESSAGESSeptember 2019April 2022Allow3010YesNo
16554833GENERATING ATTACK GRAPHS IN AGILE SECURITY PLATFORMSAugust 2019September 2021Allow2400NoNo
16549506MEMORY SYSTEMAugust 2019September 2022Allow3720NoNo
16549019SYSTEM AND METHOD FOR AUTOMATICALLY DETECTING A SECURITY VULNERABILITY IN A SOURCE CODE USING A MACHINE LEARNING MODELAugust 2019September 2022Allow3710NoNo
16547250METHODS AND APPARATUS TO DECONFLICT MALWARE OR CONTENT REMEDIATIONAugust 2019November 2021Allow2710NoNo
16527425DYNAMIC ACCESS CONTROLS USING VERIFIABLE CLAIMSJuly 2019August 2022Allow3730YesNo
16506046PRIVATE KEY OPERATIONSJuly 2019November 2021Abandon2820NoNo
16450579SYSTEM AND METHOD FOR AUTOMATICALLY ASSOCIATING CYBERSECURITY INTELLIGENCE TO CYBERTHREAT ACTORSJune 2019October 2021Allow2700YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner GAO, SHU CHUN.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
1
Examiner Affirmed
1
(100.0%)
Examiner Reversed
0
(0.0%)
Reversal Percentile
5.7%
Lower than average

What This Means

With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
5
Allowed After Appeal Filing
3
(60.0%)
Not Allowed After Appeal Filing
2
(40.0%)
Filing Benefit Percentile
87.6%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 60.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner GAO, SHU CHUN - Prosecution Strategy Guide

Executive Summary

Examiner GAO, SHU CHUN works in Art Unit 2437 and has examined 251 patent applications in our dataset. With an allowance rate of 89.6%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 30 months.

Allowance Patterns

Examiner GAO, SHU CHUN's allowance rate of 89.6% places them in the 69% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by GAO, SHU CHUN receive 1.66 office actions before reaching final disposition. This places the examiner in the 46% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by GAO, SHU CHUN is 30 months. This places the examiner in the 41% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +17.6% benefit to allowance rate for applications examined by GAO, SHU CHUN. This interview benefit is in the 63% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 33.0% of applications are subsequently allowed. This success rate is in the 64% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 28.8% of cases where such amendments are filed. This entry rate is in the 33% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 50.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 41% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 83.3% of appeals filed. This is in the 73% percentile among all examiners. Of these withdrawals, 40.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.

Petition Practice

When applicants file petitions regarding this examiner's actions, 50.0% are granted (fully or in part). This grant rate is in the 60% percentile among all examiners. Strategic Note: Petitions show above-average success regarding this examiner's actions. Petitionable matters include restriction requirements (MPEP § 1002.02(c)(2)) and various procedural issues.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 13% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.9% of allowed cases (in the 55% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

    Relevant MPEP Sections for Prosecution Strategy

    • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
    • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
    • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
    • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
    • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
    • MPEP § 1214.07: Reopening prosecution after appeal

    Important Disclaimer

    Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

    No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

    Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

    Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.