USPTO Examiner HUANG CHENG FENG - Art Unit 2497

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
18892295CORRELATING NETWORK EVENT ANOMALIES USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE TO IDENTIFY ATTACK INFORMATIONSeptember 2024April 2025Allow610YesNo
18892283CORRELATING NETWORK EVENT ANOMALIES USING ACTIVE AND PASSIVE EXTERNAL RECONNAISSANCE TO IDENTIFY ATTACK INFORMATIONSeptember 2024April 2025Allow610YesNo
18668166SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATIONMay 2024December 2024Allow700NoNo
18653991AUTOMATICALLY COMPUTING AND IMPROVING A CYBERSECURITY RISK SCOREMay 2024January 2025Allow800NoNo
18652559Enforcing a Segmentation Policy in Co-Existence with a System FirewallMay 2024May 2025Allow1210YesNo
18640567SYSTEMS AND METHODS FOR BLOCKING SPOOFED TRAFFICApril 2024June 2025Allow1410NoNo
18637358DECEIVING ATTACKERS ACCESSING NETWORK DATAApril 2024May 2025Allow1310NoNo
18622996CYBERSECURITY ANALYSIS AND PROTECTION USING DISTRIBUTED SYSTEMSMarch 2024November 2024Allow800NoNo
18607698Systems and Methods for Contextually Securing Remote Function CallsMarch 2024December 2024Allow910NoNo
18593909CYBERSECURITY RECONNAISSANCE, ANALYSIS, AND SCORING USING DISTRIBUTED SYSTEMSMarch 2024February 2025Allow1110NoNo
18587387SYSTEM AND METHOD FOR SEGMENTING TRANSIT CAPABILITIES WITHIN A MULTI-CLOUD ARCHITECTUREFebruary 2024March 2025Allow1210NoNo
18437347ADDRESSABLE SMART AGENT DATA TECHNOLOGY TO DETECT UNAUTHORIZED TRANSACTION ACTIVITYFebruary 2024April 2025Allow1520NoNo
18433090PHISHING EMAIL CAMPAIGN IDENTIFICATIONFebruary 2024June 2025Allow1720NoNo
18409538SOURCE CODE CLUSTERING FOR AUTOMATICALLY IDENTIFYING FALSE POSITIVES GENERATED THROUGH STATIC APPLICATION SECURITY TESTINGJanuary 2024October 2024Allow910YesNo
18402662AI-DRIVEN DEFENSIVE CYBERSECURITY STRATEGY ANALYSIS AND RECOMMENDATION SYSTEMJanuary 2024September 2024Allow900NoNo
18391457TRUSTED-CODE GENERATED REQUESTSDecember 2023September 2024Allow900NoNo
18389082PROCESSING A CONTINGENT ACTION TOKEN SECURELYNovember 2023June 2025Allow1900NoNo
18501383SYSTEMS AND METHODS FOR REQUEST GOVERNANCE IN MULTI-TENANCY CLOUD ARCHITECTURENovember 2023May 2025Allow1900NoNo
18381864APPLICATION PROGRAMMING INTERFACE FINGERPRINT DATA GENERATION AT A MOBILE DEVICE EXECUTING A NATIVE MOBILE APPLICATIONOctober 2023February 2025Allow1620NoNo
18375023DATA AND SOURCE VALIDATION FOR EQUIPMENT OUTPUT DATA OR EQUIPMENT FAILURE PREDICTION USING BLOCKCHAINSSeptember 2023December 2024Allow1410NoNo
18472790CROSS-REGIONAL REPLICATION OF KEYSSeptember 2023August 2024Allow1110NoNo
18457557MULTI-FACTOR NETWORK SEGMENTATIONAugust 2023April 2025Allow2000NoNo
18454166UNIFIED IDENTITY AND ACCESS MANAGEMENT (IAM) CONTROL PLANE FOR SERVICES ASSOCIATED WITH A HYBRID CLOUDAugust 2023April 2024Allow800NoNo
18234241METHODS AND SYSTEMS FOR MULTI-MODAL SECURITY ACCESS CONTROL BASED ON DETAILS OF SECURITY CIRCUMSTANCESAugust 2023April 2025Allow2000NoNo
18362881NETWORK SECURITY DEVICEJuly 2023May 2025Allow2200NoNo
18228143SECURELY MANAGING NETWORK CONNECTIONSJuly 2023July 2024Allow1110NoNo
18227713UPGRADING FIREWALL MODULE ON PORT-BY-PORT BASISJuly 2023September 2024Abandon1310NoNo
18353898SYSTEM AND METHOD FOR ONGOING TRIGGER-BASED SCANNING OF CYBER-PHYSICAL ASSETSJuly 2023March 2024Allow810NoNo
18218899ENFORCING A SEGMENTATION POLICY IN CO-EXISTENCE WITH A SYSTEM FIREWALLJuly 2023February 2024Allow710NoNo
18346148Deceiving Attackers Accessing Network DataJune 2023May 2025Allow2330YesNo
18195470SECURED DATA ACCESS FROM A MOBILE DEVICE EXECUTING A NATIVE MOBILE APPLICATION AND A HEADLESS BROWSERMay 2023June 2024Allow1310NoNo
18141912SYSTEMS AND METHODS FOR NOTARY AGENT FOR PUBLIC KEY INFRASTRUCTURE NAMESMay 2023January 2025Allow2120YesNo
18304343SYSTEM AND METHODS FOR PREDICTIVE CYBER-PHYSICAL RESOURCE MANAGEMENTApril 2023April 2025Allow2400NoNo
18299677SYSTEM AND METHOD FOR SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATIONApril 2023January 2024Allow910NoNo
18183022DECEIVING ATTACKERS ACCESSING NETWORK DATAMarch 2023January 2024Allow1010NoNo
18181539SYSTEM AND METHOD FOR SELF-ADJUSTING CYBERSECURITY ANALYSIS AND SCORE GENERATIONMarch 2023January 2024Allow1010NoNo
18173611DECEIVING ATTACKERS ACCESSING ACTIVE DIRECTORY DATAFebruary 2023January 2025Allow2320NoNo
18170495GENERATION OF EFFECTIVE SPURIOUS DATA FOR MODEL DEGRADATIONFebruary 2023April 2025Allow2600YesNo
18167307Use of Obfuscation Marker to Obfuscate a Face Image and Enable Computerized Face IdentificationFebruary 2023March 2025Allow2510YesNo
18106627MULTI-USER, SHARED BLOCKCHAIN SYSTEMFebruary 2023April 2025Abandon2601NoNo
18158142SYSTEMS AND METHODS FOR THREAT MITIGATION USING ARTIFICIAL INTELLIGENCEJanuary 2023February 2025Allow2510YesNo
18059541SYSTEMS AND METHODS FOR PERFORMING SINGLE INPUT BASED MULTIFACTOR AUTHENTICATIONNovember 2022July 2024Allow2000NoNo
18057581One-Armed Inline Decryption/Encryption Proxy Operating in Transparent Bridge ModeNovember 2022May 2024Allow1810NoNo
17990084DETECTING MAN-IN-THE-MIDDLE ATTACKS IN ADAPTIVE STREAMINGNovember 2022February 2024Allow1520NoNo
18055183DETECTING VULNERABILITIES IN CONFIGURATION CODE OF A CLOUD ENVIRONMENT UTILIZING INFRASTRUCTURE AS CODENovember 2022March 2025Allow2810NoNo
18051110DETECTION OF RANSOMWARE ATTACK USING ENTROPY VALUESOctober 2022February 2025Allow2810NoNo
18049946SYSTEMS AND METHODS FOR INTERNET OF THINGS SECURITY ENVIRONMENTOctober 2022April 2024Allow1820NoNo
18049746ON-DEMAND OPERATIONAL AIRGAP POLICY - VALUE THRESHOLDOctober 2022February 2025Allow2810NoNo
17972436SECURE BLOCKCHAIN-BASED CONSENSUSOctober 2022February 2024Allow1610NoNo
18048248SECURELY MANAGING NETWORK CONNECTIONSOctober 2022June 2023Allow800YesNo
18048116SYSTEM, METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT PROVIDING IMPROVED PASSWORD SECURITYOctober 2022January 2025Abandon2710NoNo
18046646MITIGATING AGAINST SPURIOUS DELIVERIES IN DEVICE ONBOARDINGOctober 2022July 2024Allow2200NoNo
17956470THREAT CONTROL METHOD AND SYSTEMSeptember 2022December 2024Allow2710NoNo
17953123TRUSTED-CODE GENERATED REQUESTSSeptember 2022August 2023Allow1110YesNo
17906591INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING SYSTEMSeptember 2022December 2024Allow2710NoNo
17932815SECURITY MODELSeptember 2022September 2024Allow2410NoNo
17898531RECEPTION DEVICE, TRANSMISSION DEVICE, AND DATA PROCESSING METHODAugust 2022March 2024Allow1920NoNo
17823193POLICY MANAGEMENT SYSTEM TO PROVIDE AUTHORIZATION INFORMATION VIA DISTRIBUTED DATA STOREAugust 2022December 2023Allow1620NoNo
17822446AUDIO FEEDBACK-BASED VIDEO AUTHENTICATION METHOD AND SYSTEMAugust 2022November 2024Allow2710YesNo
17802178CONNECTION OF COMPUTERS OVER NETWORKSAugust 2022November 2024Allow2710NoNo
17894115SYSTEMS AND METHODS FOR USING BLOCKCHAIN TO SECURE DATA ACQUIRED IN SURGICAL AND OTHER MEDICAL PROCEDURESAugust 2022October 2024Allow2610NoNo
17888908RULE-BASED DOCUMENT SCRUBBING OF SENSITIVE DATAAugust 2022May 2023Allow910NoNo
17817135MBS Security in UE MobilityAugust 2022April 2025Allow3320YesNo
17873847USER PLANE MODEL FOR NON-3GPP ACCESS TO FIFTH GENERATION CORE NETWORKJuly 2022December 2024Abandon2810NoNo
17759140A METHOD OF EFFICIENTLY PROVIDING PATHHISTORY IN C-V2XJuly 2022February 2025Allow3110NoNo
17813314ELECTRONIC MAIL AUTHENTICATION AND TRACKING IN DATABASE SYSTEM USING MESSAGE IDENTIFIER WITHIN BODY OF ELECTRONIC MAILJuly 2022October 2024Allow2710NoNo
17793322LOGIN AUTHENTICATION METHOD, APPARATUS, AND SYSTEMJuly 2022October 2024Allow2710NoNo
17865634Secure TransmissionJuly 2022May 2023Allow1000YesNo
17758829READER DEVICE AND METHOD OF CONFIGURING THE SAMEJuly 2022August 2024Allow2500NoNo
17860333HIGH-SPEED NETWORK PACKET PAYLOAD INSPECTION SYSTEM BASED ON EBPF (EXTENDED BERKELEY PACKET FILTER)/XDP (EXPRESS DATA PATH) FOR CONTAINER ENVIRONMENTJuly 2022November 2024Allow2810NoNo
17859331User-Configured Music Room Digital Assets in Virtual EnvironmentsJuly 2022May 2024Allow2200NoNo
17854496IMAGE PRIVACY PROTECTION METHOD AND APPARATUSJune 2022May 2025Abandon3520YesNo
17845826SYSTEM AND METHOD FOR DETECTION AND MITIGATION OF DATA SOURCE COMPROMISES IN ADVERSARIAL INFORMATION ENVIRONMENTSJune 2022December 2023Allow1710NoNo
17844603METHODS AND SYSTEMS FOR SYSTEM VULNERABILITY DETERMINATION AND UTILIZATION FOR THREAT MITIGATIONJune 2022November 2024Allow2910NoNo
17829211COLLABORATIVE DATABASE AND REPUTATION MANAGEMENT IN ADVERSARIAL INFORMATION ENVIRONMENTSMay 2022May 2023Allow1200YesNo
17828149ANOMALY DETECTION APPARATUS, ANOMALY DETECTION METHOD, AND COMPUTER READABLE MEDIUMMay 2022March 2025Abandon3420YesNo
17827713AUTHENTICATION DEVICE USING DNA BASE SEQUENCE INFORMATIONMay 2022October 2024Abandon2910NoNo
17778384APPARATUS FOR GENERATING NON-COPYABLE DIGITAL VALUE, AND METHOD THEREFORMay 2022September 2024Allow2810NoNo
17747160SYSTEM AND METHOD FOR TRUSTED CONTROL FLOW ENFORCEMENT USING DERIVED ENCRYPTION KEYSMay 2022September 2023Allow1601YesNo
17730447BIOMETRIC BASED ACCESS CONTROL FOR DaaSApril 2022July 2024Allow2710YesNo
17730062ENFORCING A SEGMENTATION POLICY IN CO-EXISTENCE WITH A SYSTEM FIREWALLApril 2022April 2023Allow1100NoNo
17767556SYSTEMS AND METHODS FOR SUBSCRIPTION AND IDENTITY AUTHENTICATION MANAGEMENTApril 2022March 2025Allow3520NoNo
17767208Method, System, Electronic Device, and Storage Medium For Storing and Collecting Temperature DataApril 2022June 2024Allow2610NoNo
17710686IPSEC LOAD BALANCING IN A SESSION-AWARE LOAD BALANCED CLUSTER (SLBC) NETWORK DEVICEMarch 2022January 2024Allow2100NoNo
17710766BSS (BASIC SERVICE SET) FAST TRANSITIONS BETWEEN ACCESS POINTS USING OPPORTUNISTIC KEY GENERATIONMarch 2022December 2024Allow3210NoNo
17707834METHODS AND SYSTEMS TO ESTABLISH TRUSTED PEER-TO-PEER COMMUNICATIONS BETWEEN NODES IN A BLOCKCHAIN NETWORKMarch 2022January 2024Allow2110NoNo
17701482SECURELY MANAGING NETWORK CONNECTIONSMarch 2022September 2022Allow610YesNo
17695987Systems and Methods for Contextually Securing Remote Function CallsMarch 2022February 2024Allow2300NoNo
17687124CROSS-REGIONAL REPLICATION OF KEYSMarch 2022August 2023Allow1700NoNo
17677237IDENTIFICATION OF ONE OR MORE SERVICES FOR A USER'S NETWORK-CONNECTED SMART DEVICE USING A SMART DEVICE FINGERPRINT OF THE NETWORK-CONNECTED SMART DEVICEFebruary 2022March 2025Allow3720YesNo
17676054Managing Admin Controlled Access of External Resources to Group-Based Communication Interfaces via a Group-Based Communication SystemFebruary 2022November 2023Allow2120YesNo
17589774SYSTEM AND METHOD FOR CYBERSECURITY ANALYSIS AND PROTECTION USING DISTRIBUTED SYSTEMSJanuary 2022December 2023Allow2210NoNo
17589550PERSISTENCY OF RESOURCE REQUESTS AND RESPONSES IN PROXIED COMMUNICATIONSJanuary 2022April 2024Allow2610YesNo
17574443PHISHING EMAIL CAMPAIGN IDENTIFICATIONJanuary 2022December 2023Allow2300YesNo
17567074SYSTEM AND METHOD FOR CYBERSECURITY RECONNAISSANCE, ANALYSIS, AND SCORE GENERATION USING DISTRIBUTED SYSTEMSDecember 2021October 2023Allow2200NoNo
17560599AUTOMATING TRUST IN SOFTWARE UPGRADESDecember 2021June 2024Allow2910YesNo
17545702APPARATUS, METHODS, AND SYSTEMS FOR PRE-AUTHENTICATION, KEEP-AUTHENTICATION, AND REGAIN-AUTHENTICATIONDecember 2021June 2025Allow4220NoNo
17544039METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING AN OBJECT OF INTEREST WITHIN AN IMAGE FROM A DIGITAL SIGNATURE GENERATED BY A SIGNATURE ENCODING MODULE INCLUDING A HYPERNETWORKDecember 2021January 2024Allow2500NoNo
17543184METHODS AND SYSTEMS FOR NATURAL LANGUAGE PROCESSING OF GRAPH DATABASE QUERIESDecember 2021August 2024Allow3201NoNo
17536916SOURCE CODE CLUSTERING FOR AUTOMATICALLY IDENTIFYING FALSE POSITIVES GENERATED THROUGH STATIC APPLICATION SECURITY TESTINGNovember 2021October 2023Allow2300NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner HUANG, CHENG-FENG.

Patent Trial and Appeal Board (PTAB) Decisions

Total PTAB Decisions
2
Examiner Affirmed
2
(100.0%)
Examiner Reversed
0
(0.0%)
Reversal Percentile
6.9%
Lower than average

What This Means

With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.

Strategic Value of Filing an Appeal

Total Appeal Filings
15
Allowed After Appeal Filing
10
(66.7%)
Not Allowed After Appeal Filing
5
(33.3%)
Filing Benefit Percentile
91.2%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 66.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner HUANG, CHENG-FENG - Prosecution Strategy Guide

Executive Summary

Examiner HUANG, CHENG-FENG works in Art Unit 2497 and has examined 505 patent applications in our dataset. With an allowance rate of 88.5%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 27 months.

Allowance Patterns

Examiner HUANG, CHENG-FENG's allowance rate of 88.5% places them in the 66% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by HUANG, CHENG-FENG receive 1.54 office actions before reaching final disposition. This places the examiner in the 39% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by HUANG, CHENG-FENG is 27 months. This places the examiner in the 57% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +19.0% benefit to allowance rate for applications examined by HUANG, CHENG-FENG. This interview benefit is in the 66% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 36.7% of applications are subsequently allowed. This success rate is in the 80% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 29.4% of cases where such amendments are filed. This entry rate is in the 34% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 57.1% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 46% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 87.5% of appeals filed. This is in the 78% percentile among all examiners. Of these withdrawals, 35.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.

Petition Practice

When applicants file petitions regarding this examiner's actions, 30.8% are granted (fully or in part). This grant rate is in the 23% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 16% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 21% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • RCEs are effective: This examiner has a high allowance rate after RCE compared to others. If you receive a final rejection and have substantive amendments or arguments, an RCE is likely to be successful.
  • Appeal filing as negotiation tool: This examiner frequently reconsiders rejections during the appeal process. Filing a Notice of Appeal may prompt favorable reconsideration during the mandatory appeal conference.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.