USPTO Examiner KONG ALAN LINGQIAN - Art Unit 2494

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18882373METHODS AND SYSTEMS FOR VERIFYING A USER AGENTSeptember 2024December 2024Allow300NoNo
18634032DISTRIBUTED COMPUTER ARCHITECTURE FOR PROCESSING DATAApril 2024November 2024Allow710YesNo
18632273BATCH PRIVACY INFORMATION RETRIEVAL METHOD AND APPARATUSApril 2024August 2024Allow500YesNo
18366875MULTI-LEVEL MALWARE CLASSIFICATION MACHINE-LEARNING METHOD AND SYSTEMAugust 2023May 2025Allow2210NoNo
18352935DYNAMICALLY ENCRYPTING AND DECRYPTING APPLICATION DATA USING DYNAMICALLY LINKED INTERPOSER MODULESJuly 2023February 2024Allow710YesNo
18296425SYSTEMS AND METHODS FOR SECURE AUTHENTICATION BETWEEN APPLICATION IN QUANTUM COMPUTINGApril 2023February 2025Allow2340YesNo
18126475Video and Image Recording For an Air Gapped SystemMarch 2023January 2025Abandon2110NoNo
18145666DETERMINATION OF DEVICES THAT ARE AVAILABLE FOR UNLOCKDecember 2022April 2025Allow2810YesNo
18079665DIRECTED FUZZING FOR VULNERABILITY DETECTIONDecember 2022June 2025Allow3020YesNo
17960382CERTIFICATE ENROLLMENT PROTOCOL FOR AN UNTRUSTWORTHY ELECTRONIC DEVICEOctober 2022June 2025Abandon3220NoNo
17954685SYSTEM AND METHOD FOR TIME-BASED CRYPTOGRAPHYSeptember 2022October 2023Abandon1310NoNo
17885706INFORMATION PROCESSING APPARATUS AND CONTROL METHOD OF THE SAMEAugust 2022March 2025Allow3220YesNo
17885236ESTABLISHING TRUST BETWEEN APPLICATIONS IN A COMPUTING ENVIRONMENTAugust 2022May 2025Allow3410NoNo
17812116Tracking Subsea Telecommunications Asset Capacity and SpectrumJuly 2022October 2024Allow2710NoNo
17854492Software Upgrade Method and ApparatusJune 2022May 2025Allow3420NoNo
17853215Security Token Provisioning for a ProductJune 2022August 2024Allow2610YesNo
17663123MEMORY SYSTEM SECURITY AND AUTHENTICATION USING ASYMMETRIC KEYSMay 2022June 2025Allow3730YesNo
17731080SYSTEMS AND METHODS FOR CONTEXT-SWITCHING AUTHENTICATION OVER SHORT RANGE WIRELESS COMMUNICATIONApril 2022March 2025Allow3520YesNo
17709674Medical Data Authentication System, Medical Data Authentication Method, and Computer Program Product ThereofMarch 2022August 2024Abandon2810NoNo
17700535SYSTEM FOR PROVIDING CHATBOT SERVICES IN INTEGRATED WAYMarch 2022June 2024Allow2710NoNo
17692458STORAGE DEVICE, HOST DEVICE AND DATA TRANSFER METHOD THEREOFMarch 2022April 2025Allow3710YesNo
17689798MULTIPLE AUTHORIZATION REQUESTS FROM A DATA STORAGE DEVICEMarch 2022October 2024Allow3210YesNo
17668163SYSTEMS AND METHODS FOR ISOLATED AND PROTECTED FILE SYSTEM AND DATA RESTORATIONFebruary 2022September 2024Allow3120YesNo
17580216ELECTRONIC DEVICE AND METHOD OF CONTROLLING REMOTE LOCKING OF EXTERNAL ELECTRONIC DEVICE BASED ON BLUETOOTHJanuary 2022June 2025Allow4130YesNo
17555421FILE ENCRYPTION AND DECRYPTION METHOD AND ELECTRONIC DEVICE USING THE SAMEDecember 2021May 2025Abandon4020NoNo
17644195COMMUNICATION NODE WITH SECURE CRYPTOGRAPHIC KEYS AND METHODS FOR SECURING THEREINDecember 2021September 2024Allow3320YesNo
17615257AUTHENTICATION SYSTEM FOR ELECTRONIC DEVICENovember 2021June 2025Allow4330NoNo
17614441GAS METER READING SYSTEM BASED ON NATIONAL CRYPTOGRAPHIC ALGORITHM AND GAS DATA TRANSMISSION METHOD THEREOFNovember 2021November 2024Abandon3620NoNo
17479080Distributed Secure Content Inspection In Enterprise NetworksSeptember 2021February 2025Allow4030YesNo
17479182AUTHORIZATION SCOPE MANAGEMENT FOR LOW-CODE PROGRAMMING ENVIRONMENTSSeptember 2021December 2024Allow3930YesNo
17437220DYNAMIC WHITE BOX-BASED DATA PROCESSING METHOD, APPARATUS, AND DEVICESeptember 2021June 2024Allow3300NoNo
17467142PROTECTING CONFIDENTIALITY OF AIR-GAPPED LOGSSeptember 2021April 2024Abandon3220NoNo
17410102ENCRYPTED FILE NAME METADATA IN A DISTRIBUTED FILE SYSTEM DIRECTORY ENTRYAugust 2021November 2024Allow3940YesNo
17428778DETERMINISTIC TRUSTED EXECUTION CONTAINER THROUGH MANAGED RUNTIME LANGUAGE METADATAAugust 2021June 2024Allow3520YesNo
17424960Implementation of Trusted Computing System Based on Master Controller of Solid-State DriveJuly 2021November 2024Allow4010YesNo
17372587INDICATING A TYPE OF SECURE BOOT TO ENDPOINT DEVICES BY A SECURITY PROCESSORJuly 2021February 2024Allow3220YesNo
17358526CONCURRENT VOLUME AND FILE BASED INLINE ENCRYPTION ON COMMODITY OPERATING SYSTEMSJune 2021August 2024Abandon3820NoNo
17356784ENCRYPTED DATA PROCESSING DESIGN INCLUDING CLEARTEXT REGISTER FILESJune 2021March 2024Allow3340YesNo
17354494CRYPTOGRAPHIC PROCESSING METHOD, RELATED ELECTRONIC DEVICE AND COMPUTER PROGRAMJune 2021January 2024Allow3000YesNo
17346323DATA QUERY AGAINST AN ENCRYPTED DATABASEJune 2021December 2023Allow3020YesNo
17344358BOOT-SPECIFIC KEY ACCESS IN A VIRTUAL DEVICE PLATFORMJune 2021August 2023Allow2620YesNo
17333578PROCESSING DATA PAGES UNDER GROUP-LEVEL ENCRYPTIONMay 2021October 2023Allow2820YesNo
17296453STORAGE OF NETWORK CREDENTIALSMay 2021June 2024Allow3720YesNo
17288223METHODS, USER EQUIPMENT AND NETWORK NODE, FOR DETECTION OF COMMUNICATION WITH A NON-LEGITIMATE DEVICEApril 2021January 2025Abandon4530NoNo
17224732Enhanced D3-Cold And Faster RecoveryApril 2021June 2023Allow2620YesNo
17214223SYSTEM AND METHOD FOR ENCRYPTING STORAGE MEDIUMS WITH AN ENCRYPTION CHIPMarch 2021June 2023Allow2730NoNo
17212522AUTHENTICATION IN AN UPDATE MODE OF A MOBILE DEVICEMarch 2021May 2023Allow2610YesNo
17211948UNSTRUCTURED DATA ACCESS CONTROLMarch 2021July 2024Allow4040YesNo
17207725SECURE DATA STORAGE DEVICE AND METHOD OF ENCRYPTIONMarch 2021March 2023Allow2420YesNo
17199944INTEGRATED CIRCUIT FOR PHYSICALLY UNCLONABLE FUNCTION AND METHOD OF OPERATING THE SAMEMarch 2021August 2023Allow2910YesNo
17250802SYSTEM AND METHOD FOR HANDLING ANONYMOUS BIOMETRIC AND/OR BEHAVIOURAL DATAMarch 2021May 2024Allow3910NoNo
17248886HIGH THROUGHPUT STORAGE ENCRYPTIONFebruary 2021April 2023Allow2620YesNo
17150478PROCESSING UNIT, ELECTRONIC DEVICE, AND SECURITY CONTROL METHODJanuary 2021January 2024Allow3630NoNo
17130989STORAGE DEVICE AND SOLID STATE DRIVE DEVICE WITH STRUCTURE FOR IMPROVING SECURITY PERFORMANCE AND REMOVING DATA, METHOD OF OPERATING THE SAME, AND DATA CENTER INCLUDING THE SAMEDecember 2020December 2024Allow4830YesNo
17130467CYBERATTACK INFORMATION ANALYSIS PROGRAM, CYBERATTACK INFORMATION ANALYSIS METHOD, AND INFORMATION PROCESSING APPARATUSDecember 2020June 2024Abandon4220NoNo
17125300HYBRID PUBLIC-KEY AND PRIVATE-KEY ENCRYPTION SYSTEMDecember 2020March 2023Allow2720YesNo
17252412BLOCKCHAIN SYSTEM, BLOCKCHAIN MANAGEMENT APPARATUS, NETWORK CONTROL APPARATUS, METHOD AND PROGRAMDecember 2020February 2024Abandon3840NoNo
17111253SYSTEMS AND METHODS FOR EVALUATING SECURITY RISKS USING A MANUFACTURER-SIGNED SOFTWARE IDENTIFICATION MANIFESTDecember 2020December 2022Allow2420NoNo
17109670METHOD FOR PERFORMING SEGMENTING LOCKING AND MERGING CONTROL OF ENCRYPTED DIGITAL ASSETS BASED ON TIME DIMENSIONDecember 2020January 2024Allow3710NoNo
17110043SYSTEMS AND METHODS FOR BARE-METAL OR PRE-BOOT USER-MACHINE AUTHENTICATION, BINDING, AND ENTITLEMENT PROVISIONINGDecember 2020April 2023Allow2910NoNo
17054285Blockchain Based Access Control Using Time-Dependent Obfuscation of Access TokensNovember 2020January 2023Allow2620NoNo
17051760CRYPTOGRAPHIC KEY DISTRIBUTIONOctober 2020October 2022Allow2320YesNo
17083002PROTECTION OF A SECURED APPLICATION IN A CLUSTEROctober 2020May 2023Allow3130YesNo
17060756WATERFALL REQUEST FOR DECRYPTIONOctober 2020May 2022Allow1920YesNo
17035389METHOD AND APPARATUS FOR STORING AND PROCESSING APPLICATION PROGRAM INFORMATIONSeptember 2020November 2023Allow3740YesNo
16976067SECURE VAULT SYSTEM FOR PRIVATE KEY STORAGEAugust 2020March 2024Abandon4210NoNo
16984239VERIFIABLE LABELS FOR MANDATORY ACCESS CONTROLAugust 2020April 2023Allow3220YesYes
16932698METHODS AND SYSTEMS FOR ENCRYPTING SHARED INFORMATION THROUGH ITS LIFECYCLEJuly 2020February 2022Allow1900YesNo
16962363HIGH AVAILABILITY SECURE NETWORK INCLUDING DUAL MODE AUTHENTICATIONJuly 2020November 2023Allow4040YesNo
16894661Automatic ProvisioningJune 2020January 2023Allow3130YesNo
16890563SYSTEM AND METHOD FOR MANAGING TRUST AND WEARABLE DEVICE FOR USE THEREWITHJune 2020July 2022Allow2610YesNo
16890878CRYPTOGRAPHIC SYSTEMS WITH VARIABLE LAYOUT CRYPTOGRAPHYJune 2020September 2022Allow2810YesNo
16861767METHODS AND SYSTEMS FOR UTILIZING HARDWARE-SECURED RECEPTACLE DEVICESApril 2020October 2022Allow2930YesNo
16819239INFORMATION MANAGEMENT SYSTEM AND METHOD FOR THE SAMEMarch 2020September 2023Allow4230NoNo
16774513SYSTEMS AND METHODS FOR MONITORING ATTACKS TO DEVICESJanuary 2020April 2023Allow3930YesNo
16740537VEHICLE CONTROL DEVICE, VEHICLE CONTROL DEVICE START-UP METHOD, AND RECORDING MEDIUMJanuary 2020January 2023Allow3620YesNo
16674909SECURE MODE SWITCHING IN NEURAL PROCESSOR CIRCUITNovember 2019August 2022Allow3420YesNo
16674880METHOD OF VERIFYING INTEGRITY OF A PAIR OF CRYPTOGRAPHIC KEYS AND CRYPTOGRAPHIC DEVICENovember 2019November 2022Allow3620NoNo
16673868RESILIENCY FOR MACHINE LEARNING WORKLOADSNovember 2019October 2023Allow4740YesNo
16673692UNIFIED DATA FABRIC FOR MANAGING DATA LIFECYCLES AND DATA FLOWSNovember 2019August 2023Allow4540YesNo
16664116APPARATUS AND METHOD FOR GENERATING CRYPTOGRAPHIC ALGORITHM, APPARATUS AND METHOD FOR ENCRYPTIONOctober 2019January 2023Allow3930NoNo
16663936APPARATUS AND METHOD FOR GENERATING CRYPTOGRAPHIC ALGORITHM, APPARATUS AND METHOD FOR ENCRYPTIONOctober 2019January 2023Allow3930NoNo
16661026METHOD FOR GENERATING A RANDOM NUMBER, RANDOM NUMBER GENERATION CIRCUIT AND COMPUTER PROGRAMOctober 2019October 2023Allow4830NoNo
16598955METHOD AND SYSTEM FOR SIGNING AN ARTIFICIAL INTELLIGENCE WATERMARK USING IMPLICIT DATAOctober 2019April 2022Allow3020YesNo
16592513CUSTOMIZABLE TEMPLATE FOR ASSET TOKENOctober 2019June 2022Abandon3320NoNo
16481087COMPONENT RECALL CHECKINGJuly 2019June 2022Abandon3410NoNo
16479737DATA PROTECTION IN A PRE-OPERATION SYSTEM ENVIRONMENT BASED ON AN EMBEDDED KEY OF AN EMBEDDED CONTROLLERJuly 2019June 2022Allow3520YesNo
16273138Secure Access to Stored Data Files Using Tokens Encoded in Optical CodesFebruary 2019September 2024Abandon6040NoNo
16268690SECURE CLOUD COLLABORATION PLATFORMFebruary 2019March 2022Allow3710NoNo
16226558GENERATING A RANDOM VALUE BASED ON A NOISE CHARACTERISTIC OF A MEMORY CELLDecember 2018April 2023Allow5230YesNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner KONG, ALAN LINGQIAN.

Strategic Value of Filing an Appeal

Total Appeal Filings
1
Allowed After Appeal Filing
1
(100.0%)
Not Allowed After Appeal Filing
0
(0.0%)
Filing Benefit Percentile
96.4%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 100.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner KONG, ALAN LINGQIAN - Prosecution Strategy Guide

Executive Summary

Examiner KONG, ALAN LINGQIAN works in Art Unit 2494 and has examined 87 patent applications in our dataset. With an allowance rate of 82.8%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 33 months.

Allowance Patterns

Examiner KONG, ALAN LINGQIAN's allowance rate of 82.8% places them in the 50% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.

Office Action Patterns

On average, applications examined by KONG, ALAN LINGQIAN receive 2.10 office actions before reaching final disposition. This places the examiner in the 70% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by KONG, ALAN LINGQIAN is 33 months. This places the examiner in the 28% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +42.9% benefit to allowance rate for applications examined by KONG, ALAN LINGQIAN. This interview benefit is in the 91% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 40.9% of applications are subsequently allowed. This success rate is in the 91% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 25.0% of cases where such amendments are filed. This entry rate is in the 26% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 200.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 94% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 89% percentile among all examiners. Of these withdrawals, 100.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.

Petition Practice

When applicants file petitions regarding this examiner's actions, 75.0% are granted (fully or in part). This grant rate is in the 90% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 15% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 20% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • Prioritize examiner interviews: Interviews are highly effective with this examiner. Request an interview after the first office action to clarify issues and potentially expedite allowance.
  • RCEs are effective: This examiner has a high allowance rate after RCE compared to others. If you receive a final rejection and have substantive amendments or arguments, an RCE is likely to be successful.
  • Request pre-appeal conferences: PACs are highly effective with this examiner. Before filing a full appeal brief, request a PAC to potentially resolve issues without full PTAB review.
  • Appeal filing as negotiation tool: This examiner frequently reconsiders rejections during the appeal process. Filing a Notice of Appeal may prompt favorable reconsideration during the mandatory appeal conference.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.