USPTO Examiner WANG CHAO - Art Unit 2439

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18732000TECHNIQUES FOR SECURING NETWORK ENVIRONMENTS BY IDENTIFYING DEVICE ATTRIBUTES BASED ON STRING FIELD CONVENTIONSJune 2024May 2025Allow1110YesNo
18622553APPARATUS, METHOD AND ARTICLE TO FACILITATE AUTOMATIC DETECTION AND REMOVAL OF FRAUDULENT USER INFORMATION IN A NETWORK ENVIRONMENTMarch 2024March 2025Allow1210YesNo
18398791PRESERVING DLL HOOKSDecember 2023January 2025Allow1310YesNo
18512603DISCRETE PROCESSOR FEATURE BEHAVIOR COLLECTIONNovember 2023September 2024Allow1010YesNo
18483060SECURITY-ADAPTIVE CODE EXECUTIONOctober 2023June 2025Allow2020YesNo
18454681PROTECTING AGAINST A TRACKING PARAMETER IN A WEB LINKAugust 2023August 2024Allow1110YesNo
18069866APPARATUS, METHOD AND ARTICLE TO FACILITATE AUTOMATIC DETECTION AND REMOVAL OF FRAUDULENT USER INFORMATION IN A NETWORK ENVIRONMENTDecember 2022November 2023Allow1110YesNo
18084238KEYLOGGER DETECTION SYSTEMS AND METHODSDecember 2022September 2023Allow910YesNo
17977495SMART DATA PROTECTIONOctober 2022May 2025Abandon3040YesNo
17933897HELPER DATA INTEGRITY CHECK AND TAMPER DETECTION USING SRAM-BASED PHYSICALLY UNCLONABLE FUNCTIONSeptember 2022March 2025Allow2910YesNo
17906939METHOD, DEVICE AND SYSTEM FOR PROTECTING PRIVACYSeptember 2022March 2025Allow3010YesNo
17948104HYPERVISOR-ASSISTED DATA BACKUP AND RECOVERY FOR NEXT GENERATION ANTI-VIRUS (NGAV) SYSTEMSSeptember 2022April 2025Abandon3010NoNo
17930754SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY OPTIMIZATIONSeptember 2022April 2023Allow710YesNo
17854677SYSTEM AND METHOD FOR SECURING IDENTITY IDENTIFIERS FOR DATA ENGINEERING PROCESSINGJune 2022December 2023Abandon1720YesNo
17739107Enhanced Data Privacy Through Structure-Preserving Autoencoder with Latent Space AugmentationMay 2022October 2024Allow3010YesNo
17764988ANALYSIS FUNCTION IMPARTING DEVICE, ANALYSIS FUNCTION IMPARTING METHOD, AND ANALYSIS FUNCTION IMPARTING PROGRAMMarch 2022June 2025Abandon3820NoNo
17689287DETECTING TAMPERING OF AN ELECTRONIC DEVICEMarch 2022March 2025Allow3620YesNo
17653303SYSTEM AND METHOD FOR DETECTING AND REPORTING SYSTEM CLOCK ATTACKS WITHIN AN INDICATORS OF ATTACK PLATFORMMarch 2022January 2025Allow3420YesNo
17587406MODIFICATION OF DATA SHARING BETWEEN SYSTEMSJanuary 2022December 2023Allow2330YesNo
17537186Access Control Based on Combined Multi-System Authentication FactorsNovember 2021November 2023Abandon2320NoNo
17484195MASKED WATERMARKS AND RELATED SYSTEMS AND TECHNIQUESSeptember 2021April 2023Abandon1910NoNo
17478066CYBERSECURITY HAZARD ANALYSIS TOOLSeptember 2021August 2024Allow3510YesNo
17474862SYSTEMS AND METHODS FOR DETECTION OF SYNTHETIC IDENTITY MALFEASANCESeptember 2021July 2024Allow3430YesNo
17459999METHODS AND APPARATUS TO ORCHESTRATE PERSONAL PROTECTION ACROSS DIGITAL ASSETSAugust 2021September 2024Allow3720YesNo
17459979METHODS AND APPARATUS FOR COMPREHENSIVE USER-CENTRIC PROTECTION OF DIGITAL ASSETSAugust 2021June 2024Allow3320YesNo
17401847Method to Implement Traceability and Provability in Software DevelopmentAugust 2021November 2023Allow2720YesNo
17396134SYSTEMS AND METHODS FOR CLOUD-BASED COLLECTION AND PROCESSING OF DIGITAL FORENSIC EVIDENCEAugust 2021July 2024Allow3520YesNo
17393879MITIGATION OF RETURN STACK BUFFER SIDE CHANNEL ATTACKS IN A PROCESSORAugust 2021February 2025Allow4330YesNo
17392449SYSTEM AND METHOD TO BUILD A FILE REPUTATION CACHE FOR AN ANTIVIRUS (AV) ENDPOINTAugust 2021June 2024Allow3510YesNo
17384877SYSTEM AND METHOD FOR GENERATING A MINIMAL FORENSIC IMAGE OF A DATASET OF INTERESTJuly 2021July 2024Allow3620YesNo
17374087Preserving DLL HooksJuly 2021September 2023Allow2610YesNo
17371163LOG MANAGEMENT DEVICE AND CENTER DEVICEJuly 2021March 2025Allow4540YesNo
17356987PROTECTING AGAINST A TRACKING PARAMETER IN A WEB LINKJune 2021August 2023Allow2510YesNo
17344294TECHNIQUES FOR SECURING NETWORK ENVIRONMENTS BY IDENTIFYING DEVICE ATTRIBUTES BASED ON STRING FIELD CONVENTIONSJune 2021March 2024Allow3320YesNo
17340164DEVICES AND METHODS TO SECURE A SYSTEM ON A CHIPJune 2021November 2024Allow4140YesNo
17319299Known-Deployed File Metadata Repository and Analysis EngineMay 2021December 2023Allow3120YesNo
17319638Known-Deployed File Metadata Repository and Analysis EngineMay 2021December 2023Allow3120YesNo
17206989TAMPER DETECTION FOR EXECUTABLE APPLICATIONSMarch 2021June 2024Allow3930YesNo
17275415MICROSERVICE ADAPTIVE SECURITY HARDENINGMarch 2021June 2024Allow3920YesNo
16345785SECURITY POLICY AND AUDIT LOG TWO WAY INQUIRY, COLLATION, AND TRACKING SYSTEM AND METHODMarch 2021January 2025Allow6040YesNo
17195038SYSTEM AND METHOD FOR DEFENDING APPLICATIONS INVOKING ANONYMOUS FUNCTIONSMarch 2021July 2024Abandon4020NoNo
17193251TECHNIQUES FOR PREDICTING LEAKAGE OF A SERIAL NUMBERMarch 2021March 2024Allow3630YesNo
17188547METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MAIN MEMORY TAG COMPRESSIONMarch 2021February 2024Allow3520YesNo
17187180Discrete Processor Feature Behavior CollectionFebruary 2021August 2023Allow3010YesNo
17168079METHOD AND DEVICE FOR SYMBOLIC ANALYSIS OF A SOFTWARE PROGRAMFebruary 2021January 2025Allow4750YesNo
17159748DYNAMIC ACCOUNT RISK ASSESSMENT FROM HETEROGENEOUS EVENTSJanuary 2021August 2024Allow4340YesNo
17154358COMPUTER-IMPLEMENTED TOOL THAT FACILITATES MALWARE DETECTIONJanuary 2021September 2024Allow4440YesYes
17145155MANAGEMENT SYSTEMS FOR PERSONAL IDENTIFYING DATA, AND METHODS RELATING THERETOJanuary 2021July 2023Allow3120YesNo
17132001Hardware Device Integrity Validation Using Platform Configuration ValuesDecember 2020August 2023Allow3230YesNo
17127686SECURITY AUTOMATION USING ROBOTIC PROCESS AUTOMATIONDecember 2020August 2024Allow4430YesYes
17122211SYSTEM AND METHOD FOR EXTERNALLY-DELEGATED ACCESS CONTROL AND AUTHORIZATIONDecember 2020June 2023Abandon3020YesNo
17109942KEYLOGGER DETECTION SYSTEMS AND METHODSDecember 2020July 2022Allow2020YesNo
17108435SYSTEM AND METHOD OF DETECTING HACKING ACTIVITIES DURING THE INTERACTION OF USERS WITH BANKING SERVICESDecember 2020January 2024Allow3740YesNo
17104013DEFENSE OF TARGETED DATABASE ATTACKS THROUGH DYNAMIC HONEYPOT DATABASE RESPONSE GENERATIONNovember 2020September 2023Allow3440YesNo
17082679LIMITED INTROSPECTION FOR TRUSTED EXECUTION ENVIRONMENTSOctober 2020December 2023Abandon3730YesNo
17082768Role-Based Access Control for a Storage SystemOctober 2020November 2023Allow3730YesNo
17050493SYSTEM AND METHOD FOR SECURING ELECTRONIC CORRESPONDENCEOctober 2020December 2022Abandon2620NoNo
17042622EXTRACTION DEVICE, EXTRACTION METHOD, RECORDING MEDIUM, AND DETECTION DEVICESeptember 2020August 2022Allow2310YesNo
17024787SYSTEM AND METHOD FOR PERFORMING AUTOMATED SECURITY REVIEWSSeptember 2020September 2023Allow3620YesNo
16991288PROVENANCE-BASED THREAT DETECTION TOOLS AND STEALTHY MALWARE DETECTIONAugust 2020May 2022Allow2110YesNo
16912512DATA PROTECTION FOR NETWORKING DEVICESJune 2020March 2023Allow3311YesNo
16896244Memory Device Providing Data SecurityJune 2020June 2024Abandon4940NoNo
16833427APPARATUS, METHOD AND ARTICLE TO FACILITATE AUTOMATIC DETECTION AND REMOVAL OF FRAUDULENT USER INFORMATION IN A NETWORK ENVIRONMENTMarch 2020November 2022Allow3110YesNo
16752825Automated Detection of User Device Security Risks Related to Process Threads and Corresponding ActivityJanuary 2020June 2022Allow2920YesNo
16689122SMART DATA PROTECTIONNovember 2019August 2022Allow3330YesNo
16687036IoT DEVICE MANAGED BASED ON BLOCK CHAIN, SYSTEM AND METHOD THEREOFNovember 2019April 2022Abandon2910NoNo
16663453SYSTEM AND METHOD FOR SECURING IDENTITY IDENTIFIERS FOR DATA ENGINEERING PROCESSINGOctober 2019March 2022Allow2910YesNo
16663971MASKED WATERMARKS AND RELATED SYSTEMS AND TECHNIQUESOctober 2019June 2021Allow2020YesNo
16607747PERSONAL VOICE ASSISTANT AUTHENTICATIONOctober 2019August 2021Allow2220YesNo
16660504PRIVATE PASSWORD CONSTRAINT VALIDATIONOctober 2019September 2022Allow3530YesNo
16659016TWO-WAY AUTHENTICATION FOR VOICE-ACTIVATED DEVICESOctober 2019December 2024Allow6060YesYes
16656188SYSTEM AND METHOD FOR AUTHENTICATING HUMANS BASED ON BEHAVIORAL PATTERNOctober 2019November 2021Allow2510YesNo
16601117APPARATUS, SYSTEMS, AND METHODS FOR ASSIGNING ACCESS PERMISSION TO SOCIAL MEDIAOctober 2019September 2022Allow3540YesNo
16601451ADDING ADVERSARIAL ROBUSTNESS TO TRAINED MACHINE LEARNING MODELSOctober 2019March 2022Allow2930YesNo
16587806Runtime Detection of Browser Exploits Via Injected ScriptsSeptember 2019February 2022Allow2920YesNo
16495283Storing Data On Target Data Processing DevicesSeptember 2019April 2023Allow4340YesNo
16566009SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY OPTIMIZATIONSeptember 2019June 2022Allow3320YesNo
16545108System and Method for the Secure and Efficient Provision of at Least Partly Automated Driving ModesAugust 2019May 2022Allow3340YesNo
16474642PREVENTING DATA LEAKAGEJune 2019November 2021Allow2810YesNo
16455717DDOS ATTACK DETECTION METHOD AND DEVICEJune 2019May 2021Allow2210YesNo
16434964Remote Access to a Storage DeviceJune 2019December 2022Allow4250YesNo
16431786MODIFICATION OF DATA SHARING BETWEEN SYSTEMSJune 2019November 2021Allow2920YesNo
16296273VALIDATING THE INTEGRITY OF APPLICATION DATA USING SECURE HARDWARE ENCLAVESMarch 2019July 2021Allow2810YesNo
16291058SECURITY-ADAPTIVE CODE EXECUTIONMarch 2019July 2023Allow5350YesNo
16263338REAL-TIME DETECTION OF MISUSE OF SYSTEM CREDENTIALSJanuary 2019September 2022Allow4310YesNo
16259960CONTINUOUS VULNERABILITY MANAGEMENT FOR MODERN APPLICATIONSJanuary 2019June 2022Allow4010YesNo
16228049SECURITY MODULE FOR MOBILE DEVICESDecember 2018March 2021Allow2820YesNo
16217733GRAPHIC COLOR-BASED AUTHENTICATIONDecember 2018October 2021Allow3430YesNo
16215214Systems And Methods For Behavioral Threat DetectionDecember 2018March 2022Allow3920YesNo
16215251Systems And Methods For Behavioral Threat DetectionDecember 2018September 2021Allow3310YesNo
16211405SYSTEM AND METHOD FOR DEVICE AND TRANSACTION AUTHENTICATIONDecember 2018January 2021Allow2510YesNo
16098091TRIGGERING ROLE-BASED WORKFLOWS WITH USER AUTHENTICATIONOctober 2018August 2022Abandon4540YesNo
16146824AUTHENTICATION SERVER, AUTHENTICATION SYSTEM AND METHOD FOR AUTHENTICATIONSeptember 2018February 2021Abandon2910NoNo
16146794COMMUNICATION SYSTEMSeptember 2018December 2020Abandon2710NoNo
16146817Content Authorization and DeliverySeptember 2018September 2024Allow6060YesYes
16117671SYSTEM-LEVEL DATA SECURITY BASED ON ENVIRONMENTAL PROPERTIESAugust 2018April 2021Allow3120YesNo
16117787MULTI-LAYER CYBERSECURITY SYSTEM FOR RESTRICTING DATA ACCESSAugust 2018May 2022Abandon4530YesYes
16058746Access Control Based on Combined Multi-System Authentication FactorsAugust 2018July 2021Allow3520NoNo
16044645AUTHENTICATION SYSTEM, METHOD AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUMJuly 2018June 2022Abandon4640NoNo
16045115Secure Storage DeviceJuly 2018May 2021Abandon3310NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner WANG, CHAO.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
1
Examiner Affirmed
1
(100.0%)
Examiner Reversed
0
(0.0%)
Reversal Percentile
5.8%
Lower than average

What This Means

With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
6
Allowed After Appeal Filing
0
(0.0%)
Not Allowed After Appeal Filing
6
(100.0%)
Filing Benefit Percentile
2.8%
Lower than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 0.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the bottom 25% across the USPTO, indicating that filing appeals is less effective here than in most other areas.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.

Examiner WANG, CHAO - Prosecution Strategy Guide

Executive Summary

Examiner WANG, CHAO works in Art Unit 2439 and has examined 123 patent applications in our dataset. With an allowance rate of 81.3%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 33 months.

Allowance Patterns

Examiner WANG, CHAO's allowance rate of 81.3% places them in the 46% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.

Office Action Patterns

On average, applications examined by WANG, CHAO receive 2.25 office actions before reaching final disposition. This places the examiner in the 77% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by WANG, CHAO is 33 months. This places the examiner in the 27% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +88.7% benefit to allowance rate for applications examined by WANG, CHAO. This interview benefit is in the 100% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 35.7% of applications are subsequently allowed. This success rate is in the 76% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 23.1% of cases where such amendments are filed. This entry rate is in the 22% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 7% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 83.3% of appeals filed. This is in the 73% percentile among all examiners. Of these withdrawals, 20.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.

Petition Practice

When applicants file petitions regarding this examiner's actions, 66.7% are granted (fully or in part). This grant rate is in the 83% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 13% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 16% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Expect multiple rounds of prosecution: This examiner issues more office actions than average. Address potential issues proactively in your initial response and consider requesting an interview early in prosecution.
  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.
  • RCEs are effective: This examiner has a high allowance rate after RCE compared to others. If you receive a final rejection and have substantive amendments or arguments, an RCE is likely to be successful.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.