USPTO Examiner DO KHANG D - Art Unit 2492

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19265257SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONSJuly 2025September 2025Allow200YesNo
19205793COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON DEVICE CRITICALITY SCORE AND METHODS OF USE THEREOFMay 2025March 2026Allow1020YesNo
19122410CHAINING MESSAGE AUTHENTICATION CODESApril 2025January 2026Allow900YesNo
18902634SYSTEMS AND METHODS TO PERFORM PHISHING DETECTION AND DEVICE ATTESTATION VIA BROWSER EXTENSIONSeptember 2024March 2025Allow501YesNo
18885207SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONSSeptember 2024April 2025Allow701YesNo
18843974METHOD AND APPARATUS FOR DETECTING URL RELATED TO PHISHING SITE USING ARTIFICIAL INTELLIGENCE AND GENERATIVE AI ALGORITHMSeptember 2024March 2025Allow700YesNo
18820347INTEGRATED SECURITY FOR CLOUD APPLICATIONSAugust 2024December 2024Allow400YesNo
18800553COMPUTER-BASED SYSTEMS CONFIGURED FOR NETWORK CHARACTERIZATION AND MANAGEMENT BASED ON AUTOMATED KEY TERRAIN IDENTIFICATION AND METHODS OF USE THEREOFAugust 2024February 2025Allow610YesNo
18765860Advanced SIP-Based Caller Identification and Voicemail Analysis System for Fraud Prevention in TelecommunicationsJuly 2024January 2026Allow1800YesNo
18763525Intelligent Technical Protocol Based Approach Leveraging AI-ML to Block Vishing ScammersJuly 2024January 2026Allow1900YesNo
18736505INTELLIGENT ANTI-PHISHING MANAGEMENTJune 2024August 2024Allow200YesNo
18736499INTELLIGENT ANTI-PHISHING MANAGEMENTJune 2024August 2024Allow300YesNo
18647427SYSTEM AND METHOD FOR CLASSIFYING A USER FOR DETECTING PHISHING ATTACKSApril 2024July 2024Allow300YesNo
18640446END-POINT MEDIA WATERMARKINGApril 2024December 2024Allow800NoNo
18621079TRAINING TRUSTED USERS OF AN ENTERPRISE NETWORK FOR PHISHING ATTACKS ON A PER-USER BASISMarch 2024November 2025Allow2000YesNo
18607463SYSTEMS AND METHODS FOR INTELLIGENT IDENTIFICATION AND AUTOMATED DISPOSAL OF NON-MALICIOUS ELECTRONIC COMMUNICATIONSMarch 2024June 2024Allow300YesNo
18421790SYSTEM AND METHOD FOR DETECTING PHISHING ATTACKS IN SMS COMMUNICATIONSJanuary 2024April 2024Allow200YesNo
18406597CONTINUOUS IMPROVEMENT OF SECURITY DETECTION RULESJanuary 2024December 2025Allow2300YesNo
18537874HARMFUL-WEBSITE CLASSIFICATION METHODDecember 2023January 2026Abandon2500YesNo
18537884MACHINE LEARNING-BASED HARMFUL-WEBSITE CLASSIFICATION METHODDecember 2023January 2026Abandon2510YesNo
18529562COMPUTER-BASED SYSTEMS FOR DETERMINING A LOOK-ALIKE DOMAIN NAMES IN WEBPAGES AND METHODS OF USE THEREOFDecember 2023October 2025Allow2210YesNo
18509754SYSTEMS AND METHODS FOR IDENTIFYING BRANDS UTILIZED IN WEBSITE PHISHING CAMPAIGNSNovember 2023May 2025Allow1800YesNo
18506475INTELLIGENT ANTI-PHISHING MANAGEMENTNovember 2023May 2024Allow600YesNo
18506495INTELLIGENT ANTI-PHISHING MANAGEMENTNovember 2023May 2024Allow600YesNo
18503771INFORMATION SECURITY SYSTEM AND METHOD FOR PHISHING WEBSITE IDENTIFICATION BASED ON IMAGE HASHINGNovember 2023March 2025Allow1610YesNo
18383796METHOD OF RANKING AND ADDRESS NETWORK THREATSOctober 2023March 2024Allow510YesNo
18489978Cyber Security Phishing CampaignOctober 2023October 2025Allow2310YesNo
18377573OPTIMIZED ANALYSIS FOR DETECTING HARMFUL CONTENTOctober 2023September 2024Allow1200YesNo
18477658SECURITY SYSTEM FOR DETECTING MALICIOUS ACTOR'S OBSERVATIONSeptember 2023March 2026Allow2910YesNo
18463750TECHNIQUES FOR DIGITAL WALLET INTEGRATION AND FOR SCANNING TRANSACTIONS USING INTEGRATED MODULESSeptember 2023November 2023Allow200YesNo
18450871SYSTEM AND METHOD FOR MITIGATING CYBER THREATS USING RISK ANALYSISAugust 2023March 2026Allow3110YesNo
18230331SYSTEM AND METHOD FOR DETECTING PHISHING EVENTSAugust 2023April 2024Allow800YesNo
18362572TESTING COMPLEX DECISION SYSTEMS USING OUTCOME LEARNING-BASED MACHINE LEARNING MODELSJuly 2023January 2024Allow601YesNo
18354270MALICIOUS MESSAGE CLASSIFICATON USING MACHINE LEARNING MODELSJuly 2023March 2024Allow800YesNo
18346417ELECTRONIC SMOKING DEVICE AND CAPSULE SYSTEMJuly 2023September 2024Abandon1410NoNo
18217273COMBINATION RULE MINING FOR MALWARE SIGNATURE GENERATIONJune 2023November 2024Allow1720YesNo
18318198TECHNIQUES FOR RISK MANAGEMENT BASED ON SOFTWARE BILL OF MATERIALSMay 2023September 2025Allow2900YesNo
18036929System and Method for Improving the Efficiency in Vehicular Data Access While Maintaining Data SecurityMay 2023March 2026Abandon3420NoNo
18135778Detection of site phishing using neural network-enabled site image analysis leveraging few-shot learningApril 2023May 2025Allow2500YesNo
18031624EXTRACTION DEVICE, EXTRACTION METHOD, AND EXTRACTION PROGRAMApril 2023October 2025Allow3020YesNo
18030907ATTACK SCENARIO GENERATION APPARATUS, RISK ANALYSIS APPARATUS, METHOD, AND COMPUTER READABLE MEDIAApril 2023January 2026Allow3310YesNo
18030585INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUMApril 2023August 2025Allow2810YesNo
18125916MACHINE LEARNING FOR VISUAL SIMILARITY-BASED PHISHING DETECTIONMarch 2023November 2025Abandon3220NoNo
18121952TECHNIQUES FOR BOT DETECTIONMarch 2023September 2025Allow3010YesNo
18113179DETERMINING TEMPLATE DIFFICULTY BASED ON SECURITY MATURITYFebruary 2023September 2025Allow3010YesNo
18111580BOTNET DETECTION AND MITIGATIONFebruary 2023October 2023Allow700YesNo
18110495Restricting Screenshare of Web Pages to Select List of Allowed Website URLsFebruary 2023September 2023Allow700YesNo
18168433SYSTEMS AND METHODS FOR AUTOMATICALLY ASSIGNING USER PERMISSIONSFebruary 2023March 2026Allow3711YesNo
18163772CYBER CLONE OF A COMPUTING ENTITYFebruary 2023February 2025Allow2500YesNo
18160211MALICIOUS MESSAGE CLASSIFICATON USING MACHINE LEARNING MODELSJanuary 2023April 2023Allow300YesNo
18100084AUTOMATED EFFECTIVE TEMPLATE GENERATIONJanuary 2023January 2025Allow2400YesNo
18097091MULTI-VECTOR MALWARE DETECTION DATA SHARING SYSTEM FOR IMPROVED DETECTIONJanuary 2023August 2023Allow700YesNo
18094628SYSTEMS AND METHODS FOR EFFECTIVE DELIVERY OF SIMULATED PHISHING CAMPAIGNSJanuary 2023January 2024Abandon1310NoNo
18094632SYSTEMS AND METHODS FOR EFFECTIVE DELIVERY OF SIMULATED PHISHING CAMPAIGNSJanuary 2023March 2023Allow300YesNo
18090430Linear Network Coding for BlockchainsDecember 2022August 2025Allow3220NoNo
18069817END-POINT MEDIA WATERMARKINGDecember 2022September 2024Abandon2120NoNo
17991766Systems and Methods for Context-Based Permissioning of Personally Identifiable InformationNovember 2022April 2025Allow2930YesNo
17986853MOBILE DEVICE SECURITY APPLICATION FOR MALICIOUS WEBSITE DETECTION BASED ON REPRESENTATIVE IMAGENovember 2022October 2023Allow1110NoNo
17981743SYSTEMS, METHODS, AND APPARATUSES FOR DETECTION OF DATA MISAPPROPRIATION ATTEMPTS ACROSS ELECTRONIC COMMUNICATION PLATFORMSNovember 2022January 2026Allow3830YesNo
17973794ACCESSING AN ENCRYPTED PLATFORMOctober 2022November 2025Allow3720YesNo
17970069SYSTEMS AND METHODS FOR INTELLIGENT PHISHING THREAT DETECTION AND PHISHING THREAT REMEDIATION IN A CYBER SECURITY THREAT DETECTION AND MITIGATION PLATFORMOctober 2022June 2024Allow2000YesNo
17931595SECURING NETWORK RESOURCES FROM KNOWN THREATSSeptember 2022October 2023Allow1310YesNo
17940523PROCESSING AND STORING EVENT DATA IN A KNOWLEDGE GRAPH FORMAT FOR ANOMALY DETECTIONSeptember 2022February 2023Allow500YesNo
17899316AUTOMATED EFFECTIVE TEMPLATE GENERATIONAugust 2022December 2022Allow300YesNo
17896974SYSTEM FOR CYBER-ATTACK SIMULATION USING ARTIFICIAL INTELLIGENCE MODELINGAugust 2022March 2024Allow1810YesNo
17809614NETWORK EXPOSURE FUNCTION (NEF) FOR SUCI-BASED UE-INITIATED SERVICE AUTHORIZATIONJune 2022March 2025Allow3310YesNo
17805329Ephemeral Data StorageJune 2022January 2025Allow3220YesYes
17745701DETECTING PHISHING WEBSITES VIA A MACHINE LEARNING-BASED SYSTEM USING URL FEATURE HASHES, HTML ENCODINGS AND EMBEDDED IMAGES OF CONTENT PAGESMay 2022September 2024Allow2800YesNo
17744704OPTIMIZED ANALYSIS FOR DETECTING HARMFUL CONTENTMay 2022November 2022Allow610YesNo
17744712OPTIMIZED ANALYSIS FOR DETECTING HARMFUL CONTENTMay 2022July 2023Allow1410YesNo
17744714OPTIMIZED ANALYSIS FOR DETECTING HARMFUL CONTENTMay 2022July 2023Allow1410YesNo
17734956DETECTING PHISHING PDFS WITH AN IMAGE-BASED DEEP LEARNING APPROACHMay 2022February 2025Allow3420YesNo
17772206FILE STORAGE METHOD, TERMINAL, AND STORAGE MEDIUMApril 2022October 2024Allow2900YesNo
17717474METHODS AND TECHNIQUES FOR REAL-TIME DETECTION OF INFECTED IOT DEVICESApril 2022September 2024Allow2900YesNo
17696151SYSTEMS AND METHODS FOR INTELLIGENT PHISHING THREAT DETECTION AND PHISHING THREAT REMEDIATION IN A CYBER SECURITY THREAT DETECTION AND MITIGATION PLATFORMMarch 2022July 2022Allow401YesNo
17675480Chip Device and Method for a Randomized Logic EncryptionFebruary 2022August 2024Allow3020YesNo
17673464CLIENT MAC SOURCE ADDRESS RANDOMIZATION BY MESH NODES IN WIRELESS MESH NETWORKSFebruary 2022April 2025Allow3711YesNo
17632839INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE MEDIUMFebruary 2022January 2025Allow3610YesNo
17587340VALIDATING NETWORK SECURITY ALERTING PIPELINE USING SYNTHETIC NETWORK SECURITY EVENTSJanuary 2022August 2024Allow3000YesNo
17587303CONTINUOUS IMPROVEMENT OF SECURITY DETECTION RULESJanuary 2022December 2023Allow2200YesNo
17561612SYSTEM AND METHOD FOR MONITORING SECURITY ATTACK CHAINSDecember 2021March 2024Allow2700YesNo
17645251MULTI-TENANT CRYPTOGRAPHY IMPLEMENTATION COMPLIANCEDecember 2021October 2024Allow3410YesNo
17546676SYSTEMS AND METHODS FOR IMPROVING ASSESSMENT OF SECURITY RISK BASED ON PERSONAL INTERNET ACCOUNT DATADecember 2021October 2022Allow1020YesNo
17536380Computerized System For Analysis Of Vertices And Edges Of An Electronic Messaging SystemNovember 2021April 2024Allow2941YesNo
17533041END-POINT MEDIA WATERMARKINGNovember 2021January 2025Allow3840YesYes
17512609PLATFORM FOR PRIVACY PRESERVING DECENTRALIZED LEARNING AND NETWORK EVENT MONITORINGOctober 2021May 2024Allow3000YesNo
17501708SYSTEMS AND METHODS FOR INTELLIGENT PHISHING THREAT DETECTION AND PHISHING THREAT REMEDIATION IN A CYBER SECURITY THREAT DETECTION AND MITIGATION PLATFORMOctober 2021February 2022Allow400YesNo
17602794Method For Identifying And Authenticating A User ProfileOctober 2021June 2024Abandon3210NoNo
17602168METHODS AND DEVICES FOR PROPAGATING BLOCKS IN A BLOCKCHAIN NETWORKOctober 2021November 2024Allow3710YesNo
17490188METHOD AND SYSTEM FOR GENERATING SECURITY FINDINGS ACQUISITION RECORDS FOR SYSTEMS AND SYSTEM COMPONENTSSeptember 2021February 2024Allow2900YesNo
17491438COMMAND CLASSIFICATION USING ACTIVE LEARNINGSeptember 2021March 2024Allow2900YesNo
17487319IMPROVING NETWORK SECURITY THROUGH REAL-TIME ANALYSIS OF CHARACTER SIMILARITIESSeptember 2021February 2023Allow1730YesNo
17486731DETECTING MALICIOUS BEHAVIOR USING AN ACCOMPLICE MODELSeptember 2021March 2025Allow4120YesNo
17484103METHOD AND APPARATUS TO REDUCE RISK OF DENIAL OF SERVICE RESOURCE ACQUISITION ATTACKS IN A DATA CENTERSeptember 2021February 2026Abandon5360YesNo
17482266SYSTEM AND METHOD FOR SECURING STORED AND MERGED IMAGES USING BLOCKCHAINSeptember 2021March 2025Abandon4111NoNo
17478342SYSTEM AND METHOD FOR BUILDING A TRUSTED NETWORK OF DEVICESSeptember 2021August 2025Allow4730YesNo
17475233DETECTING PHISHING WEBSITES VIA A MACHINE LEARNING-BASED SYSTEM USING URL FEATURE HASHES, HTML ENCODINGS AND EMBEDDED IMAGES OF CONTENT PAGESSeptember 2021January 2022Allow400YesNo
17466207RISK ANALYZER AND RISK ANALYSIS METHODSeptember 2021November 2021Allow300YesNo
17411873AUTOMATIC DETECTION OF PROXY-BASED PHISHING SITESAugust 2021March 2024Allow3120YesNo
17445294METHOD AND SYSTEM FOR LAYERED DETECTION OF PHISHING WEBSITESAugust 2021July 2023Allow2300YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner DO, KHANG D.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
2
Examiner Affirmed
1
(50.0%)
Examiner Reversed
1
(50.0%)
Reversal Percentile
73.3%
Higher than average

What This Means

With a 50.0% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.

Strategic Value of Filing an Appeal

Total Appeal Filings
7
Allowed After Appeal Filing
6
(85.7%)
Not Allowed After Appeal Filing
1
(14.3%)
Filing Benefit Percentile
95.4%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 85.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner DO, KHANG D - Prosecution Strategy Guide

Executive Summary

Examiner DO, KHANG D works in Art Unit 2492 and has examined 288 patent applications in our dataset. With an allowance rate of 89.9%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 28 months.

Allowance Patterns

Examiner DO, KHANG D's allowance rate of 89.9% places them in the 73% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by DO, KHANG D receive 1.56 office actions before reaching final disposition. This places the examiner in the 29% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by DO, KHANG D is 28 months. This places the examiner in the 68% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +32.0% benefit to allowance rate for applications examined by DO, KHANG D. This interview benefit is in the 80% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 33.9% of applications are subsequently allowed. This success rate is in the 74% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 17.3% of cases where such amendments are filed. This entry rate is in the 20% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 120.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 82% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 77.8% of appeals filed. This is in the 69% percentile among all examiners. Of these withdrawals, 42.9% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.

Petition Practice

When applicants file petitions regarding this examiner's actions, 32.6% are granted (fully or in part). This grant rate is in the 20% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 2.3% of allowed cases (in the 70% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • Plan for RCE after final rejection: This examiner rarely enters after-final amendments. Budget for an RCE in your prosecution strategy if you receive a final rejection.
  • Request pre-appeal conferences: PACs are highly effective with this examiner. Before filing a full appeal brief, request a PAC to potentially resolve issues without full PTAB review.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.