USPTO Examiner CHANG KENNETH W - Art Unit 2438

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19340363FLEXIBLE SOFTWARE-DEFINED RADIO ACCESS NETWORK ARCHITECTURE WITH SLICING SUPPORT AND METHODS FOR USE THEREWITHSeptember 2025December 2025Allow300YesNo
19216285TECHNIQUES FOR CODE INTENT DISCOVERYMay 2025November 2025Allow610NoNo
19193315SYSTEMS, METHODS, AND STORAGE MEDIA FOR API DETECTION AND MANAGEMENT IN A SOURCE-CODE REPOSITORY USING A COMPUTING PLATFORMApril 2025August 2025Allow300YesNo
19187990Talking Head Digital Identity AuthenticationApril 2025March 2026Abandon1010NoNo
19098535SYSTEM FOR DETECTING MALICIOUS NODES IN A WIRELESS SENSOR NETWORK AND A METHOD THEREOFApril 2025July 2025Allow310NoNo
19095690CAPSULE MIGRATION IN A FLEXIBLE SOFTWARE-DEFINED RADIO ACCESS NETWORK ARCHITECTURE AND METHODS FOR USE THEREWITHMarch 2025August 2025Allow410NoNo
19095537PARALLEL STACK OPERATIONS IN A FLEXIBLE SOFTWARE-DEFINED RADIO ACCESS NETWORK ARCHITECTURE AND METHODS FOR USE THEREWITHMarch 2025August 2025Allow510NoNo
19086645Secure Code Execution for Artificial Intelligence AgentsMarch 2025May 2025Allow200YesNo
18880251SYSTEM AND METHOD FOR REAL-TIME APPLICATIONS OVER WIRELESS NETWORKSDecember 2024March 2025Allow300YesNo
18823035SECURITY IN A FLEXIBLE SOFTWARE-DEFINED RADIO ACCESS NETWORK ARCHITECTURE AND METHODS FOR USE THEREWITHSeptember 2024March 2025Allow700YesNo
18794051SYSTEM AND METHOD FOR SYNTHETIC INTRUSION DATA GENERATION AND REMEDIATION VIA MACHINE LEARNINGAugust 2024November 2025Allow1500YesNo
18730878Data Privacy Protection Method Based on Multi-Layer EncryptionJuly 2024February 2025Allow710NoNo
18753365SECURE LAYERED ENCRYPTION OF DATA STREAMSJune 2024May 2025Allow1110YesNo
18752049ADAPTIVE POLICY GENERATION IN DISTRIBUTED SECURITY FABRICSJune 2024February 2026Allow2010NoNo
18669820FILE VIEWING SYSTEM, FILE VIEWING METHOD, AND STORAGE MEDIUMMay 2024October 2025Allow1720NoNo
18668167Talking Head Digital Identity AuthenticationMay 2024January 2025Allow810NoNo
18652037DETECTING STACK PIVOTS USING STACK ARTIFACT VERIFICATIONMay 2024August 2025Allow1610NoNo
18644009Sub-Network Topology for Cybersecure 5G and 6G CommunicationsApril 2024October 2024Allow610NoNo
18603132HEALTH METRICS MONITORSMarch 2024February 2025Allow1110YesNo
18602843AUTHENTICATION AND AUTHORIZATION OF REQUESTER APPARATUSES IN NETWORK SYSTEMSMarch 2024July 2025Allow1600YesNo
18598207COMMUNICATION WITH HOME DIALYSIS MACHINES USING A NETWORK CONNECTED SYSTEMMarch 2024March 2025Allow1210YesNo
18596086METHODS AND SYSTEMS FOR SMART IDENTIFICATION AND STEP-UP AUTHENTICATIONMarch 2024February 2025Allow1110NoNo
18591538DEVICE ADDRESS ROTATION AUTHORIZATION AND VERIFICATIONFebruary 2024September 2024Allow700YesNo
18585125THREAT MITIGATION SYSTEM AND METHODFebruary 2024January 2025Allow1120NoNo
18444638IDENTIFICATION SYSTEM, GEOGRAPHIC LOCATION VERIFICATION SYSTEM, COMMUNICATION SYSTEM, PROCESS FOR AUTHENTICATING, AND METHODS OF USEFebruary 2024February 2026Allow2410YesNo
18683938First Node, Second Node, Third Node, Communications System, and Methods Performed Thereby for Handling a Denial of Services (DoS) AttackFebruary 2024March 2026Abandon2510NoNo
18440553Cloud data lake platform and SaaS orchestrationFebruary 2024March 2025Abandon1310NoNo
18426492Application Programming Interface (API) for Uniform Security Access on a 5G NetworkJanuary 2024January 2025Allow1210NoNo
18425241OBTAINING LOCATION DATA FOR DATA PROCESSING SYSTEMS USING OUT-OF-BAND COMPONENTSJanuary 2024October 2025Allow2110NoNo
18580883REFERENCE SIGNAL SECURITY TO COMBAT EAVESDROPPING AND DIRECTIONAL DENIAL OF SERVICE ATTACKSJanuary 2024March 2026Allow2610NoNo
18418003SYSTEMS AND METHODS OF PROPAGATING DATA PACKETS IN A NETWORK OF NODESJanuary 2024August 2024Allow700NoNo
18408358Virtual Personal Mailbox System and MethodJanuary 2024November 2025Allow2320NoNo
18402477NETWORK BASED HYPERLOCAL AUTHENTICATIONJanuary 2024November 2024Allow1010NoNo
18392125Systems and Methods For Packet Spreading Data Transmission With Anonymized EndpointsDecember 2023November 2024Allow1110NoNo
18512509NETWORK SECURITY ANALYSIS SYSTEM WITH REINFORCEMENT LEARNING FOR SELECTING DOMAINS TO SCANNovember 2023January 2025Allow1410NoNo
18497631Cybersecure Low-Complexity IoT Sub-Networks for 5G/6GOctober 2023April 2024Allow510YesNo
18488894METHODS AND SYSTEMS AND SECURE CONNECTIONS FOR JOINING WIRELESS NETWORKSOctober 2023October 2024Allow1210YesNo
18483337METHODS AND SYSTEMS FOR PROCESSING CYBER INCIDENTS IN CYBER INCIDENT MANAGEMENT SYSTEMS USING DYNAMIC PROCESSING HIERARCHIESOctober 2023February 2025Allow1710NoNo
18471619EXTENDED ROOT OF TRUST VALIDATION FOR REMOTE EDGE DEVICESSeptember 2023October 2025Allow2500YesNo
18469893Automated Risk Assessment Module with Real-Time Compliance MonitoringSeptember 2023July 2024Allow1010NoNo
18239435Protection of Initial Non-Access Stratum Protocol Message in 5G SystemsAugust 2023May 2025Abandon2020NoNo
18232628SYSTEM AND METHOD FOR AUTHENTICATION OF DEVICE TRANSFERS IN A DISTRIBUTED NETWORKAugust 2023June 2025Allow2200YesNo
18232020PROVENANCE BASED RISK SCORING FOR MOBILE DEVICESAugust 2023January 2024Allow610NoNo
18366150DETECTING INFORMATION BREACH IN A COMPUTER SYSTEMAugust 2023June 2025Allow2210YesNo
18360356BIDIRECTIONAL DATA OBFUSCATION AND ATOMIZATION WITHIN UNSECURED FRAGMENTED RUNTIME ENVIRONMENTSJuly 2023February 2026Allow3110NoNo
18355563TRACING FUNCTION EXECUTION IN A DATABASE SYSTEMJuly 2023February 2024Allow700YesNo
18353150SECURELY TRANSMITTING DATA IN A DATA STREAMJuly 2023September 2024Allow1410NoNo
18353752METHODS AND SYSTEMS FOR MITIGATING DENIAL OF SERVICE (DOS) ATTACK IN A WIRELESS NETWORKJuly 2023May 2024Allow1010NoNo
18218331Computer System And Method For Distributed Privacy-Preserving Shared Execution Of One Or More ProcessesJuly 2023January 2026Allow3010NoNo
18343940AMPLIFICATION REFLECTION ATTACK PROTECTION VIA ROUTING POLICY-AWARE TRAFFIC HANDLINGJune 2023October 2025Allow2810NoNo
18258918Methods for traffic redirection, corresponding terminal, controller, authorisation server, name resolution servers and computer programJune 2023January 2026Allow3110NoNo
18339966SYSTEM AND METHOD FOR USING UNIQUE DEVICE IDENTIFIERS TO ENHANCE SECURITYJune 2023July 2024Allow1310YesNo
18258998Method and System of Providing Security for Anonymous Autodiscover ServicesJune 2023August 2025Allow2610YesNo
18334619DIGITAL IDENTITY NETWORK ALERTSJune 2023February 2024Allow810NoNo
18332202METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED PROCESSOR MODE SWITCHESJune 2023May 2024Allow1110NoNo
18326792ADAPTIVE SYSTEM FOR NETWORK AND SECURITY MANAGEMENTMay 2023January 2026Allow3110YesNo
18254164METHODS, DEVICES AND SYSTEM RELATED TO A DISTRIBUTED LEDGER AND USER IDENTITY ATTRIBUTEMay 2023September 2025Allow2710NoNo
18321494DETECTING MALICIOUS SMALL CELLS BASED ON A CONNECTIVITY SCHEDULEMay 2023July 2024Allow1410NoNo
18317492COMMUNICATION WITH HOME DIALYSIS MACHINES USING A NETWORK CONNECTED SYSTEMMay 2023December 2023Allow700YesNo
18314361SYSTEMS AND METHODS FOR THE GENERATION OF EVENT OPPORTUNITIES FOR DISPLAY ON DEVICES HAVING DIFFERING FORM FACTORSMay 2023October 2025Allow3010NoNo
18034316Server-Side Anonymous Identifier Web ServiceApril 2023June 2025Abandon2610NoNo
18306294SECURE LAYERED ENCRYPTION OF DATA STREAMSApril 2023April 2024Allow1110NoNo
18138399VERIFIABLE COMPUTATION FOR CROSS-DOMAIN INFORMATION SHARINGApril 2023March 2024Allow1110NoNo
18304232METHOD, APPARATUS, SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM FOR IDENTIFYING AND PRIORITIZING NETWORK SECURITY EVENTSApril 2023September 2025Allow2920YesNo
18135105METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PERFORMING LOCATION AND VELOCITY CHECK AT SECURITY EDGE PROTECTION PROXY (SEPP) TO AVOID SPOOFINGApril 2023December 2024Allow2000NoNo
18299118SYSTEM AND METHOD FOR ZERO CONFIGURATION WI-FIApril 2023January 2026Abandon3310NoNo
18194741SHORTEST PATH BRIDGING (SPB) SECURITY GROUP POLICYApril 2023November 2025Allow3120NoNo
18129814EFFICIENT IMPLEMENTATION OF ZUC AUTHENTICATIONMarch 2023September 2025Allow3010YesNo
18245783METHOD AND DEVICE FOR TWO-FACTOR AUTHENTICATION, COMPUTER DEVICE, AND STORAGE MEDIUMMarch 2023September 2025Allow3010NoNo
18176349METHODS AND SYSTEMS FOR PROCESSING CYBER INCIDENTS IN CYBER INCIDENT MANAGEMENT SYSTEMS USING DYNAMIC PROCESSING HIERARCHIESFebruary 2023July 2023Allow400NoNo
18115334Systems and Methods For Packet Spreading Data Transmission With Anonymized EndpointsFebruary 2023March 2024Abandon1310NoNo
18172896WIRELESS INTRUSION PREVENTION USING CHANNEL SWITCH ANNOUNCEMENTFebruary 2023April 2025Allow2510YesNo
18108616Talking Head Digital Identity AuthenticationFebruary 2023January 2024Allow1210NoNo
18107637MOUNT, AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND PROGRAMFebruary 2023October 2023Allow810NoNo
18161514TRACING FUNCTION EXECUTION IN A DATABASE SYSTEMJanuary 2023June 2023Allow410NoNo
18102021SYSTEMS AND METHODS OF PROPAGATING DATA PACKETS IN A NETWORK OF NODESJanuary 2023October 2023Allow910NoNo
18100619POST-INCIDENT ALERTS FOR PII DATA LOSSJanuary 2023November 2025Allow3420YesNo
18100460NETWORK BASED HYPERLOCAL AUTHENTICATIONJanuary 2023October 2023Allow910NoNo
18017243EXPANDED INTEGRITY MONITORING OF A CONTAINER IMAGEJanuary 2023April 2024Allow1520NoNo
18005949AN IDENTIFICATION METHOD FOR ELECTRIC VEHICLE CHARGING STATIONSJanuary 2023August 2023Allow710NoNo
18154750PASSING AUTHENTICATION TOKEN TO AUTHORIZE ACCESS TO REST CALLS VIA WEB SOCKETSJanuary 2023July 2024Allow1810NoNo
18149012PHYSIO-DIGITAL NON-FUNGIBLE TOKEN SYSTEMDecember 2022November 2024Abandon2310NoNo
18091495SYSTEM AND METHOD FOR USING UNIQUE DEVICE IDENTIFIERS TO ENHANCE SECURITYDecember 2022April 2023Allow400YesNo
18083329APPARATUS AND METHOD FOR PAIRING A USER INPUT AND/OR OUTPUT DEVICE WITH A MULTIMEDIA SYSTEMDecember 2022July 2025Abandon3110NoNo
18073036IDENTIFIABLE RANDOM MEDIUM ACCESS CONTROL ADDRESSINGDecember 2022June 2023Allow600YesNo
17993735SYSTEM AND METHOD OF FUZZING PREVENTION USING INTENTIONAL RESPONSES THAT APPEAR TO BE RANDOMIZEDNovember 2022March 2025Allow2810NoNo
18054621LOADING AND UNLOADING DATA AT AN EXTERNAL STORAGE LOCATIONNovember 2022November 2023Allow1220YesNo
17984266UNIVERSAL HEALTH METRICS MONITORSNovember 2022April 2025Allow2910NoNo
18046856Cyber Security Risk Assessment and Cyber Security Insurance PlatformOctober 2022August 2023Allow1020YesNo
17963568ARTIFICIAL INTELLIGENCE PIPELINE NON-FUNGIBLE TOKEN AND EXECUTION METHOD THEREOFOctober 2022November 2024Allow2510NoNo
17938564FAULT DETECTION IN POST-QUANTUM CYPTOGRAPHYOctober 2022June 2025Allow3220YesNo
17937101PROCESSING COMPLEX PACKED TENSORS USING INTEGRATED CIRCUIT OF REAL AND COMPLEX PACKED TENSORS IN COMPLEX DOMAINSeptember 2022December 2025Allow3820YesNo
17931050SENSOR MISBEHAVIOR DETECTION SYSTEM UTILIZING COMMUNICATIONSSeptember 2022November 2024Allow2610YesNo
17823675DIGITAL IDENTITY NETWORK ALERTSAugust 2022April 2023Allow710NoNo
17898276SYSTEMS AND METHODS FOR SAFELY STORING AN OBJECTAugust 2022May 2023Allow910NoNo
17878378IDENTITY AUTHENTICATION PROCESSAugust 2022December 2024Allow2910NoNo
17872743OCCUPANT-DEPENDENT SETTING SYSTEM FOR VEHICLE, AND VEHICLEJuly 2022April 2025Allow3320NoNo
17869144Automated Risk Assessment Module with Real-Time Compliance MonitoringJuly 2022June 2023Allow1110YesNo
17858148DYNAMIC ATTACK PATH SELECTION DURING PENETRATION TESTINGJuly 2022February 2023Allow700NoNo
17809622TRACING USER-DEFINED FUNCTIONS IN A DATABASE SYSTEMJune 2022December 2022Allow610YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner CHANG, KENNETH W.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
11
Examiner Affirmed
10
(90.9%)
Examiner Reversed
1
(9.1%)
Reversal Percentile
22.9%
Lower than average

What This Means

With a 9.1% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
23
Allowed After Appeal Filing
4
(17.4%)
Not Allowed After Appeal Filing
19
(82.6%)
Filing Benefit Percentile
21.1%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 17.4% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner CHANG, KENNETH W - Prosecution Strategy Guide

Executive Summary

Examiner CHANG, KENNETH W works in Art Unit 2438 and has examined 602 patent applications in our dataset. With an allowance rate of 85.5%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 27 months.

Allowance Patterns

Examiner CHANG, KENNETH W's allowance rate of 85.5% places them in the 62% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by CHANG, KENNETH W receive 1.54 office actions before reaching final disposition. This places the examiner in the 28% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by CHANG, KENNETH W is 27 months. This places the examiner in the 72% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a -2.1% benefit to allowance rate for applications examined by CHANG, KENNETH W. This interview benefit is in the 9% percentile among all examiners. Note: Interviews show limited statistical benefit with this examiner compared to others, though they may still be valuable for clarifying issues.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 35.2% of applications are subsequently allowed. This success rate is in the 79% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 28.8% of cases where such amendments are filed. This entry rate is in the 41% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 25.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 29% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 59.3% of appeals filed. This is in the 34% percentile among all examiners. Of these withdrawals, 37.5% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 28.0% are granted (fully or in part). This grant rate is in the 15% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 2.7% of allowed cases (in the 78% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 18% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • RCEs are effective: This examiner has a high allowance rate after RCE compared to others. If you receive a final rejection and have substantive amendments or arguments, an RCE is likely to be successful.
  • Examiner cooperation: This examiner frequently makes examiner's amendments to place applications in condition for allowance. If you are close to allowance, the examiner may help finalize the claims.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.