USPTO Examiner CHANG LIN - Art Unit 2438

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
17135487SYSTEM AND METHOD FOR VERIFYING USER BY SECURITY TOKEN COMBINED WITH BIOMETRIC DATA PROCESSING TECHNIQUESDecember 2020February 2023Allow2600NoNo
17105299FORK TABLE OF AN AUTHENTICATED INDEX DATA STRUCTURENovember 2020July 2022Allow2000YesNo
17105207AUTHENTICATED INDEX DATA STRUCTURE WITH BACK-POINTERSNovember 2020April 2023Allow2910YesNo
17094387LEDGER-BASED ARTIFICIAL INTELLIGENCE DATA STORINGNovember 2020February 2023Allow2710NoNo
17091617System and Methods for Computation, Storage, and Consensus in Distributed SystemsNovember 2020March 2023Allow2810NoNo
17052214SECURE CROSS TABULATION SYSTEM, SECURE COMPUTATION APPARATUS, SECURE CROSS TABULATION METHOD, AND PROGRAMNovember 2020August 2023Allow3410YesNo
17072144ENSURING THE INTEGRITY OF DATA STORED IN A MEMORY BY USING A WATERMARKOctober 2020January 2023Allow2710YesNo
17062176SYSTEM HAVING TRACKER DATA VALIDATIONOctober 2020January 2023Allow2710NoNo
17060238INTELLIGENT TACTILE RESOURCE INSTRUMENT ACTIVATION USING ELECTROENCEPHALOGRAM SIGNALSOctober 2020January 2024Allow4030NoNo
17032041BLOCKCHAIN-BASED TIME STAMPING METHOD FOR DIGITAL SIGNATURESeptember 2020November 2023Allow3821NoNo
16979145BLOCKCHAIN-IMPLEMENTED METHODS AND SYSTEMS FOR AUTHORISATION BASED ON BILINEAR MAP ACCUMULATORSSeptember 2020June 2023Allow3320NoNo
17005941Public/Private Key Biometric Authentication SystemAugust 2020September 2023Allow3730YesNo
16872683MINING MACHINE AND METHOD FOR LIMITING COMPUTING POWERMay 2020April 2022Allow2300NoNo
16863806LARGE SCALE MALWARE SAMPLE IDENTIFICATIONApril 2020November 2022Allow3110YesNo
16650389METHOD FOR SIGNING A NEW BLOCK IN A DECENTRALIZED BLOCKCHAIN CONSENSUS NETWORKMarch 2020April 2023Allow3621NoNo
16820428UPDATE MANAGEMENT METHOD, UPDATE MANAGEMENT SYSTEM, AND NON-TRANSITORY RECORDING MEDIUMMarch 2020November 2021Allow2000NoNo
16634809EMAIL INSPECTION DEVICE, EMAIL INSPECTION METHOD, AND COMPUTER READABLE MEDIUMJanuary 2020May 2023Abandon3920NoNo
16752592METHOD FOR DISTRIBUTED AND SECURE TIMEKEEPINGJanuary 2020April 2022Allow2710YesNo
16747796DATA ACCESS CONTROL FOR EDGE DEVICES USING A CRYPTOGRAPHIC HASHJanuary 2020April 2023Allow3830YesNo
16622155INFORMATION MANAGEMENT SYSTEM WITH BLOCKCHAIN AUTHENTICATIONDecember 2019March 2022Allow2730NoNo
16615801TRUSTLESS DETERMINISTIC STATE MACHINENovember 2019May 2022Allow3000NoNo
16613821DIGITAL COMPOSITION HASHINGNovember 2019March 2022Allow2710NoNo
16674379INFORMATION PROCESSING SYSTEM, METHOD FOR PROVIDING DATA, AND METHOD FOR BUILDING INFORMATION PROCESSING SYSTEMNovember 2019June 2023Abandon4420NoNo
16669962METHODS AND SYSTEMS FOR TRACKING OWNERSHIP OF GOODS WITH A BLOCKCHAINOctober 2019October 2023Allow4740YesNo
16657890BLOCKCHAIN ACCOUNT MIGRATIONOctober 2019March 2022Allow2910YesNo
16603151EVALUATION APPARATUS, EVALUATION METHOD, AND COMPUTER READABLE MEDIUMOctober 2019February 2023Abandon4110NoNo
16498134HASH VALUES FOR A BIDIRECTIONALLY LINKED BLOCKCHAINSeptember 2019January 2022Allow2810YesNo
16572675PREVENTING SELECTIVE EVENTS OF A COMPUTING ENVIRONMENTSeptember 2019May 2022Allow3220YesNo
16568590COMPUTER SYSTEM AND DEVICE MANAGEMENT METHODSeptember 2019November 2021Allow2610YesNo
16566717TIME-CONSTRAINED AUTHENTICATIONSeptember 2019April 2023Abandon4320YesNo
16491816INFORMATION PROCESSING APPARATUS AND METHOD FOR PROCESSING INFORMATIONSeptember 2019September 2022Allow3630YesNo
16559935CACHE LINE CLEANUP FOR PREVENTION OF SIDE CHANNEL ATTACKSeptember 2019October 2021Allow2510YesNo
16524692TECHNIQUES FOR SECURING DIGITAL SIGNATURES USING MULTI-PARTY COMPUTATIONJuly 2019February 2023Allow4340YesNo
16479672METHOD AND APPARATUS FOR THE COMPUTER-AIDED CREATION AND EXECUTION OF A CONTROL FUNCTIONJuly 2019June 2022Abandon3510NoNo
16476649COMPACT RECORDATION PROTOCOLJuly 2019January 2023Allow4240YesNo
16504575AUTHENTICATED BOOT TO PROTECT STORAGE SYSTEM DATA BY RESTRICTING IMAGE DEPLOYMENTJuly 2019June 2022Allow3530NoNo
16447865System and Method for Bitcoin Mining with Reduced PowerJune 2019February 2023Allow4450YesYes
16442472SCALABLE, SECURE, EFFICIENT, AND ADAPTABLE DISTRIBUTED DIGITAL LEDGER TRANSACTION NETWORKJune 2019May 2022Allow3520YesNo
16440858INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING THE SAME, AND PROGRAM THEREFORJune 2019July 2023Abandon4940NoNo
16400207SOFT-WIRED RADIO (SWR) WEB MACHINEMay 2019March 2021Allow2310YesNo
16366655Private Blockchain With Decentralized External GatewayMarch 2019May 2023Abandon4920NoNo
16286774SYSTEMS AND METHODS FOR CATEGORIZING SECURITY INCIDENTSFebruary 2019March 2020Allow1310NoNo
16326945SECURE CONFIGURATION OF A DEVICEFebruary 2019August 2023Allow5450YesNo
16326782SECURING AN ITEM OF DEVICE USE INFORMATION OF A DEVICEFebruary 2019January 2023Allow4740NoNo
16255073FRAMEWORK FOR CYBER-PHYSICAL SYSTEM PROTECTION OF ELECTRIC VEHICLE CHARGING STATIONS AND POWER GRIDJanuary 2019June 2022Allow4130YesNo
16316406A SYSTEM AND METHOD FOR PROVIDING A SECURE DATA MONITORING SYSTEM IMPLEMENTED WITHIN FACTORY OR PLANTJanuary 2019October 2021Abandon3410NoNo
16238216DECENTRALIZED PRIVACY-PRESERVING CLINICAL DATA EVALUATIONJanuary 2019January 2022Allow3720YesNo
16224678DETECTING SCRIPT-BASED MALWAREDecember 2018November 2023Abandon5960YesNo
16221647Profiling network entities and behaviorDecember 2018May 2023Allow5380YesNo
16221753AUTHENTICATION FOR CONNECTING A BARCODE READER TO A CLIENT COMPUTING DEVICEDecember 2018October 2020Allow2210NoNo
16222501PLATFORM AND METHOD FOR RETROACTIVE RECLASSIFICATION EMPLOYING A CYBERSECURITY-BASED GLOBAL DATA STOREDecember 2018October 2021Allow3420YesNo
16222105AUTONOMOUS CONFIGURATION MODELING AND MANAGEMENTDecember 2018September 2022Allow4450YesNo
16222194Platform and Method for Enhanced Cyber-Attack Detection and Response Employing a Global Data StoreDecember 2018April 2022Abandon4030YesNo
16222021SYSTEMS AND METHODS FOR INCREASING SECURITY IN SYSTEMS USING MESH NETWORKSDecember 2018August 2021Abandon3220NoNo
16179573INTELLIGENT SYSTEM FOR DETECTING MULTISTAGE ATTACKSNovember 2018August 2021Allow3320YesNo
16179403CLOUD-BASED MULTI-FUNCTION FIREWALL AND ZERO TRUST PRIVATE VIRTUAL NETWORKNovember 2018May 2021Allow3120NoNo
16178946AHEAD OF TIME APPLICATION LAUNCHING FOR CYBERSECURITY THREAT INTELLIGENCE OF NETWORK SECURITY EVENTSNovember 2018April 2021Allow2920YesNo
16091690REGISTRATION DESTINATION DETERMINATION DEVICE, SEARCHABLE ENCRYPTION SYSTEM, REGISTRATION DESTINATION DETERMINATION METHOD, AND COMPUTER READABLE MEDIUMOctober 2018December 2020Allow2610YesNo
16091452COMMUNICATION SYSTEM AND IN-VEHICLE COMMUNICATION APPARATUSOctober 2018June 2021Abandon3220YesNo
16074379SYSTEM AND METHOD FOR CORRELATING DIVERSE LOCATION DATA FOR DATA SECURITYJuly 2018April 2021Allow3220YesNo
16011243ADAPTABLE ACCESS TO DIGITAL ASSETSJune 2018November 2021Allow4140YesNo
16011369SOFTWARE APPLICATION ACTIVATION USING A PICTURE-BASED ACTIVATION KEYJune 2018August 2020Allow2620YesNo
16011461IDENTITY-BASED AUTHENTICATION AND ACCESS CONTROL MECHANISMJune 2018August 2022Allow5050YesNo
15994951SYSTEMS AND METHODS FOR SPLIT NETWORK TUNNELING BASED ON TRAFFIC INSPECTIONMay 2018February 2021Abandon3220YesNo
15994928MEMORY ASSIGNMENT FOR GUEST OPERATING SYSTEMSMay 2018June 2020Allow2410YesNo
15994946SYSTEMS AND METHODS OF BLOCKCHAIN PLATFORM FOR DISTRIBUTED APPLICATIONSMay 2018June 2021Allow3630YesNo
15965715SYSTEM IN WHICH REDIRECT URL IS SET FOR EACH ACCESS RANGE OF RESOURCE, METHOD FOR THE SYSTEM, AND STORAGE MEDIUM FOR THE METHODApril 2018March 2020Allow2310NoNo
15965764LOCATION PRIVACY MANAGEMENT ON MAP-BASED SOCIAL MEDIA PLATFORMSApril 2018March 2022Allow4640YesNo
15965787Predictive Modeling of Domain Names Using Web-Linking CharacteristicsApril 2018May 2020Allow2500YesNo
15753507TRUSTWORTHY CLOUD-BASED SMART SPACE RATING WITH DISTRIBUTED DATA COLLECTIONFebruary 2018February 2022Allow4850YesNo
15751832FILE TRANSMITTING AND RECEIVING SYSTEMFebruary 2018April 2020Abandon2710NoNo
15749338EXPENDABLE ACCESS CONTROLJanuary 2018December 2020Allow3420NoNo
15877491COMMUNICATION SYSTEM, VEHICLE, AND MONITORING METHODJanuary 2018March 2021Abandon3720YesNo
15877514SYSTEMS, DEVICES, AND METHODS FOR IN-FIELD AUTHENTICATING OF AUTONOMOUS ROBOTSJanuary 2018May 2021Allow4030NoNo
15877222ELECTRONIC APPARATUS, AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM STORING LOCK MANAGING PROGRAMJanuary 2018December 2020Abandon3520NoNo
15851881Adaptive Data Sanitation System for EndpointsDecember 2017December 2020Allow3530YesNo
15851634Electronic Devices for Wave Pattern Data TransferDecember 2017March 2020Allow2610YesNo
15572236Secure Container Platform for Resource Access and Placement on Unmanaged and Unsecured DevicesNovember 2017December 2020Allow3720NoNo
15572082METHOD, SYSTEM, AND DEVICE FOR INFERRING MALICIOUS CODE RULE BASED ON DEEP LEARNING METHODNovember 2017October 2019Allow2310YesNo
15569465SYSTEMS AND METHODS FOR DETECTING ATTACKS IN BIG DATA SYSTEMSOctober 2017May 2020Allow3120YesNo
15569481METHOD, FIRST DEVICE, SECOND DEVICE AND SERVER FOR PROVING USER INFORMATION WITH AUTHENTICATION DATA ISSUED BY THE SERVER AND VERIFIED ON-LINEOctober 2017January 2021Allow3930NoNo
15569653METHOD AND APPARATUS FOR ENABLING SHARING OF AN ASSETOctober 2017July 2021Abandon4540NoNo
15561668WEBPAGE UPDATING METHOD AND SYSTEM AND WEBPAGE SERVERSeptember 2017March 2021Allow4140NoNo
15561564SECURITY INDICATOR SCORESSeptember 2017January 2022Allow5220NoYes
15561556METHOD FOR PROTECTING SECURITY-RELEVANT DATA IN A CACHE MEMORYSeptember 2017January 2021Allow3940NoNo
15705698METHOD AND SYSTEM FOR DATA DESTRUCTION IN A PHASE CHANGE MEMORY-BASED STORAGE DEVICESeptember 2017August 2019Allow2310YesNo
15706180METHODS AND APPARATUS TO PROVIDE USER-LEVEL ACCESS AUTHORIZATION FOR CLOUD-BASED FIELD-PROGRAMMABLE GATE ARRAYSSeptember 2017September 2019Allow2410YesNo
15705605CALL PATH DEPENDENT AUTHENTICATIONSeptember 2017April 2020Allow3120YesNo
15705586IMAGE PROCESSING METHOD, IMAGE PROCESSING SYSTEM, RECORDING MEDIUM STORING PROGRAMSeptember 2017November 2019Abandon2610YesNo
15684180SYSTEM AND METHOD FOR AGGREGATING CLIENT DATA AND CYBER DATA FOR AUTHENTICATION DETERMINATIONSAugust 2017January 2021Allow4140NoNo
15684107APPARATUS AND SYSTEM FOR INFORMATION PROCESSINGAugust 2017August 2020Allow3630YesNo
15677337FUTURE CONSTRAINTS FOR HIERARCHICAL CHAIN OF TRUSTAugust 2017November 2019Allow2710NoNo
15661880METHOD AND APPARATUS FOR SEAMLESS REMOTE RENEWAL OF OFFLINE GENERATED DIGITAL IDENTITY CERTIFICATES TO FIELD DEPLOYED HARDWARE SECURITY MODULESJuly 2017January 2024Abandon6050NoYes
15542011SYSTEM AND METHOD FOR NEUTRAL APPLICATION PROGRAMMING INTERFACEJuly 2017March 2023Allow6061YesNo
15471941DATA ACCESS INTERFACE FOR CLUSTERED DEVICESMarch 2017February 2022Allow5850YesNo
15471883DETECTION OF COMPUTER SECURITY THREATS BY MACHINE LEARNINGMarch 2017April 2019Allow2400YesNo
15458331Active Inventory Discovery for Network SecurityMarch 2017May 2022Abandon6080YesNo
15458062SECURE RESOURCE ACCESS BASED ON PSYCHOMETRICSMarch 2017July 2019Allow2920YesNo
15458361Authentication in a Computer SystemMarch 2017July 2019Abandon2810YesNo
15440063Mic Verification Method in D2D Communications and D2D Communications SystemFebruary 2017November 2019Allow3220YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner CHANG, LIN.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
2
Examiner Affirmed
2
(100.0%)
Examiner Reversed
0
(0.0%)
Reversal Percentile
6.3%
Lower than average

What This Means

With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
5
Allowed After Appeal Filing
2
(40.0%)
Not Allowed After Appeal Filing
3
(60.0%)
Filing Benefit Percentile
65.9%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 40.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner CHANG, LIN - Prosecution Strategy Guide

Executive Summary

Examiner CHANG, LIN works in Art Unit 2438 and has examined 120 patent applications in our dataset. With an allowance rate of 75.8%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 34 months.

Allowance Patterns

Examiner CHANG, LIN's allowance rate of 75.8% places them in the 43% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.

Office Action Patterns

On average, applications examined by CHANG, LIN receive 2.38 office actions before reaching final disposition. This places the examiner in the 64% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by CHANG, LIN is 34 months. This places the examiner in the 43% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +13.7% benefit to allowance rate for applications examined by CHANG, LIN. This interview benefit is in the 51% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 27.1% of applications are subsequently allowed. This success rate is in the 49% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 10.2% of cases where such amendments are filed. This entry rate is in the 11% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 66.7% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 55% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 60.0% of appeals filed. This is in the 36% percentile among all examiners. Of these withdrawals, 66.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.

Petition Practice

When applicants file petitions regarding this examiner's actions, 20.0% are granted (fully or in part). This grant rate is in the 10% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 15% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 18% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.