USPTO Examiner PARK SANGSEOK - Art Unit 2499

Recent Applications

Detailed information about the 100 most recent patent applications.

Application NumberTitleFiling DateDisposal DateDispositionTime (months)Office ActionsRestrictionsInterviewAppeal
19256384Stateless Account Authentication Provable by Cryptographic Biometric KeyJuly 2025August 2025Allow200NoNo
19220825SYSTEMS AND METHODS FOR DIGITALLY CONNECTING PATIENTS TO DE-IDENTIFIED RESEARCH SPECIMENS AND DATA USING COMPOSABLE PROTOCOLS AND TOKENIZED IDENTIFIERSMay 2025October 2025Allow510NoNo
19115721DATA ENCRYPTION METHOD AND RELATED COMPONENTMarch 2025June 2025Allow200NoNo
18949425ENCRYPTOR, DECRYPTOR, COMMUNICATIONS SYSTEM, METHODS, COMMUNICATIONS METHODNovember 2024May 2025Allow610YesNo
18902822METHOD FOR AUTHENTICATING THE QURAN IN DIGITAL FORMAT AND CERTIFYING THE AUTHENTICITY OF THE DIGITAL QURANSeptember 2024March 2025Allow610NoNo
18899726Information Processing Method, Information Processing Apparatus, and Non-Transitory Computer-Readable Storage MediumSeptember 2024July 2025Allow920NoNo
18830359IMPROVEMENTS TO SEARCHABLE SYMMETRIC ENCRYPTIONSeptember 2024June 2025Allow910NoNo
18820525MANAGING A DATA PROCESSING SYSTEM USING A MANAGEMENT CONTROLLER AND A SECURED STORAGE REGIONAugust 2024March 2026Allow1810NoNo
18809544MANAGING NETWORK ACCESS FOR VULNERABLE DEVICESAugust 2024December 2025Allow1600NoNo
18774039ENABLING COMMUNICATIONS BETWEEN APPLICATIONS IN A MOBILE OPERATING SYSTEMJuly 2024January 2026Allow1820YesNo
18770578EXTERNAL KEY AUTHENTICATION AND REGENERATIONJuly 2024August 2025Allow1320YesNo
18761614MANAGING DATA ACCESS VIA HYBRID CLOUD AND MULTI-CLOUD DATA STORESJuly 2024November 2025Allow1710NoNo
18754830MANAGING ENCRYPTION KEYS PER LOGICAL BLOCK ON A PERSISTENT MEMORY DEVICEJune 2024August 2025Allow1410NoNo
18751440HIGH DIMENSIONAL SYSTEM AND METHOD FOR GENERATING QUANTUM RANDOM NUMBERS CERTIFIED VIA VALUE INDEFINITENESSJune 2024October 2024Allow410NoNo
18749623ELECTRONIC SYSTEM OF PUF-BASED ROOT KEY ENTANGLEMENT WITH MULTIPLE DIGITAL INPUT SEQUENCES AND ROOT KEY EXTRACTORJune 2024March 2026Allow2010NoNo
18744773METHOD FOR TRACKING THE PROCESSING OF A DIGITAL ASSET, METHOD FOR IDENTIFYING SUCH PROCESSING, CORRESPONDING COMPUTER PROGRAM PRODUCTS AND DEVICESJune 2024February 2026Allow2010NoNo
18745240BROADCAST-FREE THRESHOLD POST-QUANTUM KEY GENERATION AND VERIFICATION OVER UNENCRYPTED CHANNELS FROM HARDWARE-BASED CORRELATED RANDOMNESSJune 2024July 2025Allow1310NoNo
18743458MEMORY SYSTEM AND CONTROL METHODJune 2024December 2025Allow1800YesNo
18737815TECHNIQUES FOR STORING KEY BACKUPSJune 2024October 2025Allow1700NoNo
18678216MEMORY SYSTEM AND METHOD OF OPERATING THE SAMEMay 2024January 2026Allow2010YesNo
18676636Tracking hash-based signatures in LMS and XMSS using a distributed ledgerMay 2024December 2025Allow1910NoNo
18669001ENCRYPTION APPARATUS, DECRYPTION APPARATUS, DECRYPTION-POSSIBLE VERIFICATION APPARATUS, CRYPTOSYSTEM, ENCRYPTION METHOD, AND COMPUTER READABLE MEDIUMMay 2024October 2025Allow1700NoNo
18664426MANAGING TRUSTED PLATFORM MODULE (TPM) REPLACEMENT AT AN INFORMATION HANDLING SYSTEMMay 2024December 2025Allow1910YesNo
18643908PROTECTION OF DATA BASED ON STANDARDS OF SECURITY PROTECTIONApril 2024February 2026Allow2210YesNo
18639433DYNAMICALLY MIGRATING DRIVE LOCKING KEYS ACROSS KEY MANAGEMENT SERVERSApril 2024October 2025Allow1800NoNo
18636573AUTHENTICATING COMPUTING SYSTEM REQUESTS ACROSS TENANTS OF A MULTI-TENANT DATABASE SYSTEMApril 2024October 2025Allow1810YesNo
18700646DATA FILES EMBEDDING STEGANOGRAPHIC REPEATS OF PALINDROMIC FINGERPRINTS FOR AUTHORSHIP PROTECTIONApril 2024November 2025Allow1910NoNo
18624646INTEGRATED CIRCUIT (IC) SIGNATURES WITH RANDOM NUMBER GENERATOR AND ONE-TIME PROGRAMMABLE DEVICEApril 2024March 2025Allow1110NoNo
18616542CRYPTOGRAPHIC KEY CONFIGURATION USING PHYSICAL UNCLONABLE FUNCTIONMarch 2024February 2026Allow2210YesNo
18549737Electronic Device Unlocking Method and Related DeviceMarch 2024November 2025Allow2610NoNo
18611688DATA TRANSMISSION BETWEEN DEVICESMarch 2024September 2025Allow1820NoNo
18608903GENERATING A RELIABLE BIOMETRIC HASHMarch 2024March 2026Allow2410NoNo
18597030HIGH DIMENSIONAL SYSTEM AND METHOD FOR GENERATING QUANTUM RANDOM NUMBERS CERTIFIED VIA VALUE INDEFINITENESSMarch 2024June 2024Allow310NoNo
18596154Data Storage Method and Apparatus, Device, and Readable MediumMarch 2024January 2026Allow2210NoNo
18586277MACHINE LEARNING-BASED ENCRYPTED FILE CLASSIFICATION FOR IDENTIFYING ENCRYPTED DATA MOVEMENTFebruary 2024January 2026Allow2310NoNo
18585936BROADCAST-FREE THRESHOLD POST-QUANTUM KEY GENERATION AND VERIFICATION OVER UNENCRYPTED CHANNELS FROM HARDWARE-BASED CORRELATED RANDOMNESSFebruary 2024May 2024Allow300YesNo
18582191ELECTRONIC DEVICE FOR ENCRYPTING BIOMETRIC INFORMATION AND METHOD FOR OPERATING THE SAMEFebruary 2024July 2025Allow1700NoNo
18443279METHOD FOR DETECTING VULNERABILITIES OF TARGET APPLICATIONS, DEVICE, AND MEDIUM THEREOFFebruary 2024December 2025Allow2210NoNo
18425263POLICY IMPLEMENTATION FOR DATA PROCESSING SYSTEMS BASED ON LOCATION DATA USING OUT-OF-BAND COMPONENTSJanuary 2024December 2025Allow2210NoNo
18399947Optical-Digital Encoding-Decoding SystemDecember 2023August 2025Allow1900NoNo
18392836DECENTRALIZED CLOUD STORAGE FOR SUSPICIOUS FILESDecember 2023October 2025Allow2210YesNo
18392055Secure Collaboration Between Processors And Processing Accelerators In EnclavesDecember 2023March 2025Allow1510YesNo
18391454SECURE CONTENT DISTRIBUTION AND DECRYPTIONDecember 2023January 2026Allow2510NoNo
18391179SECURE CONTENT ENCRYPTION AND DISTRIBUTIONDecember 2023December 2025Allow2410YesNo
18542040Anonymized Data Transmission Using Per-User-Functionality Secret SharesDecember 2023July 2025Allow1910NoNo
18566678SECURE COMPUTATION APPARATUS, SECURE COMPUTATION SYSTEM, SECURE COMPUTATION METHOD, AND PROGRAMDecember 2023July 2025Allow2000YesNo
18526662SENSOR DEVICE AND ENCRYPTION METHODDecember 2023January 2026Allow2530NoNo
18565000METHOD AND APPARATUS FOR DATA PROTECTION, READABLE MEDIUM AND ELECTRONIC DEVICENovember 2023August 2025Allow2110NoNo
18563372OBFUSCATED CODE ENCRYPTION METHOD AND APPARATUS, AND DEVICE AND READABLE STORAGENovember 2023August 2025Allow2110NoNo
18510362METHOD OF PROVIDING PERSONAL DATA STORAGE SERVICE BETWEEN A FIRST USER WHO IS A DATA PROVIDER AND A SECOND USER WHO IS A DATA REQUESTER BY USING SMART CONTRACT BASED ON FIRST LAYER AND PRIVACY LAYER AND STORAGE LAYER BASED ON SECOND LAYER, AND STORAGE NODE USING THE SAMENovember 2023January 2024Allow200NoNo
18493606CREATING A GLOBAL DATA SHARING LISTINGOctober 2023March 2025Allow1710YesNo
18380099PROCESSING SECURE CONTENT ON A VIRTUAL REALITY SYSTEMOctober 2023September 2025Allow2310YesNo
18479666SECURE ARCHIVE EXPLOREROctober 2023March 2025Allow1830YesNo
18375150METHOD, SYSTEM AND APPARATUS FOR DATA ENCRYPTIONSeptember 2023July 2025Allow2210YesNo
18370137PROTECTED DATA ACCESSES USING REMOTE COPY OPERATIONSSeptember 2023February 2025Allow1700NoNo
18466822SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATIONSeptember 2023December 2023Allow301YesNo
18240522SYSTEMS AND METHODS FOR TRUSTWORTHY ELECTRONIC AUTHENTICATION USING A COMPUTING DEVICEAugust 2023August 2024Allow1110YesNo
18453698CONTEXTUAL ENCRYPTION AND ACCESS CONTROL OF DATAAugust 2023September 2025Allow2510NoNo
18231623METHOD FOR DATA PROTECTION ACROSS SHARING PLATFORMSAugust 2023October 2024Allow1410YesNo
18226430Encryption Method and Apparatus, Electronic Device, and MediumJuly 2023December 2025Allow2920NoNo
18224558SCALING GATEWAY TO GATEWAY TRAFFIC USING FLOW HASHJuly 2023September 2024Allow1410YesNo
18353727DATA STRUCTURE FOR ENCRYPTING SENSITIVE DATA IN AUTONOMOUS SYSTEMS AND APPLICATIONSJuly 2023October 2025Allow2710YesNo
18219771DATA INTEGRITY IN KEY VALUE SOLID-STATE DRIVESJuly 2023August 2025Allow2510YesNo
18218955PARAMETERIZED KEY SIZE FOR CSP ADDRESS TABLE MAPPING IN SECURE MICROCONTROLLER WITH UNIFIED RRAMJuly 2023August 2025Allow2510NoNo
18208585ASSURING INTEGRITY AND SECURE ERASURE OF CRITICAL SECURITY PARAMETERSJune 2023December 2024Allow1820NoNo
18198950MANAGING ENCRYPTION KEYS PER LOGICAL BLOCK ON A PERSISTENT MEMORY DEVICEMay 2023March 2024Allow1000NoNo
18316890SYSTEMS AND METHODS FOR PROTECTION OF DATA ACROSS MULTIPLE USERS AND DEVICESMay 2023November 2024Allow1820NoNo
18311732ALIGNED HIGH PERFORMANCE DATA ENCRYPTION METHODMay 2023February 2024Allow910NoNo
18309522CERTIFICATE BASED SECURITY FOR DECLARATIVE OPERATIONSApril 2023May 2025Allow2410NoNo
18309473CERTIFICATE BASED SECURITY FOR DECLARATIVE OPERATIONSApril 2023April 2025Allow2410NoNo
18309551CERTIFICATE BASED SECURITY FOR DECLARATIVE OPERATIONSApril 2023June 2025Allow2610YesNo
18138773DOCUMENT PROTECTION MECHANISMApril 2023July 2025Allow2610NoNo
18138829ENABLING COMMUNICATIONS BETWEEN APPLICATIONS IN A MOBILE OPERATING SYSTEMApril 2023April 2024Allow1210YesNo
18306024IMPROVING DECENTRALIZATION OF LAST RESORT RECOVERY USING SECRETSApril 2023July 2025Allow2710NoNo
18302559SELECTIVELY PERMISSIONED DATA ACCESS STORAGE AND METHODApril 2023September 2025Abandon2910NoNo
18120745PROGRAM-READ-ERASE SCHEMES TO PROTECT PUF CHALLENGE-RESPONSE-PAIRS WITH PRE-FORMED ReRAMSMarch 2023June 2025Allow2710NoNo
18118761SYSTEM AND METHOD FOR SECURING DATAMarch 2023June 2025Allow2810NoNo
18115257Method for Protecting Deep Learning Model Based on Confidential ComputingFebruary 2023October 2023Allow710NoNo
18023160CLUSTER FEATURE CODE OBTAINMENT METHOD AND APPARATUS, AND ELECTRONIC DEVICEFebruary 2023August 2023Allow600YesNo
18023216SYSTEM AND METHOD FOR AUTOMATIC ONBOARDING OF NETWORK FUNCTIONS TO A CREDENTIAL VAULTFebruary 2023February 2025Allow2400NoNo
18113368Method and Apparatus for Steganographic Cipher Encryption Using True Random Number GeneratorFebruary 2023March 2024Abandon1320YesNo
18112834CRYPTOGRAPHIC KEY MANAGEMENTFebruary 2023August 2024Allow1820NoNo
18042412METHOD AND APPARATUS FOR TRUE RANDOM NUMBER GENERATION WITHIN CRYPTOGRAPHIC HARDWAREFebruary 2023May 2025Allow2610NoNo
18110583LIGHTWEIGHT ENCRYPTIONFebruary 2023September 2024Allow1910NoNo
18110767SYSTEMS AND METHODS FOR TRAINING SET OBFUSCATION UTILIZING AN INVERTED THREAT MODEL IN A ZERO-TRUST COMPUTING ENVIRONMENTFebruary 2023December 2024Allow2200YesNo
18108782HEALTH BASED DIGITAL FUNCTIONALITY AND ACCESS CONTROLFebruary 2023September 2025Allow3120YesNo
18104329DECENTRALIZED IDENTITY ACCESS MANAGEMENT USING BYZANTINE FAULT TOLERANT STATE MACHINE REPLICATIONFebruary 2023November 2024Allow2200NoNo
18159372ENCRYPTION WITH ENHANCED TWEAK GENERATIONJanuary 2023March 2025Allow2510NoNo
18100312Protocol Free Encrypting DeviceJanuary 2023May 2024Allow1601NoNo
18151769CERTIFICATE BASED SECURITY FOR DECLARATIVE OPERATIONSJanuary 2023January 2025Allow2510NoNo
18093628SYSTEMS AND METHODS FOR DYNAMIC NETWORK BAITINGJanuary 2023November 2024Allow2310NoNo
18089929Using Proof of Work for Preventing Distributed Denial of Service AttacksDecember 2022February 2025Allow2510NoNo
18087378METHOD, SYSTEM AND APPARATUS FOR DATA ENCRYPTIONDecember 2022July 2023Allow610NoNo
18145498Anonymized Transfer of Personally Identifiable InformationDecember 2022October 2024Allow2200YesNo
18082029AUTHORIZING ENTERPRISE MODULAR CHASSIS COMPONENT MOVEMENT USING FULLY HOMOMORPHIC ENCRYPTIONDecember 2022March 2025Allow2710NoNo
18064098INTEGRATED CIRCUIT (IC) SIGNATURES WITH RANDOM NUMBER GENERATOR AND ONE-TIME PROGRAMMABLE DEVICEDecember 2022December 2023Allow1210NoNo
18061307Sparse Encodings for Control SignalsDecember 2022March 2025Allow2710YesNo
18058985METHOD FOR DETECTING ANOMALIES IN DATA TRAFFIC GENERATED BY PERIPHERAL DEVICES SIMULATING HUMAN-LIKE PATTERNSNovember 2022November 2024Allow2410NoNo
18057731CONTEXT-BASED AUTOMATED TASK PERFORMANCE FOR USER CONTACTSNovember 2022February 2024Abandon1510NoNo
17987778KEY FILLING METHOD, SYSTEM, AND APPARATUS, DEVICE, AND STORAGE MEDIUMNovember 2022February 2025Allow3710NoNo

Appeals Overview

This analysis examines appeal outcomes and the strategic value of filing appeals for examiner PARK, SANGSEOK.

Strategic Value of Filing an Appeal

Total Appeal Filings
2
Allowed After Appeal Filing
1
(50.0%)
Not Allowed After Appeal Filing
1
(50.0%)
Filing Benefit Percentile
79.1%
Higher than average

Understanding Appeal Filing Strategy

Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.

In this dataset, 50.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Strategic Recommendations

Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.

Examiner PARK, SANGSEOK - Prosecution Strategy Guide

Executive Summary

Examiner PARK, SANGSEOK works in Art Unit 2499 and has examined 100 patent applications in our dataset. With an allowance rate of 82.0%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 29 months.

Allowance Patterns

Examiner PARK, SANGSEOK's allowance rate of 82.0% places them in the 54% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.

Office Action Patterns

On average, applications examined by PARK, SANGSEOK receive 1.74 office actions before reaching final disposition. This places the examiner in the 37% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.

Prosecution Timeline

The median time to disposition (half-life) for applications examined by PARK, SANGSEOK is 29 months. This places the examiner in the 64% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.

Interview Effectiveness

Conducting an examiner interview provides a +21.9% benefit to allowance rate for applications examined by PARK, SANGSEOK. This interview benefit is in the 67% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.

Request for Continued Examination (RCE) Effectiveness

When applicants file an RCE with this examiner, 36.5% of applications are subsequently allowed. This success rate is in the 83% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.

After-Final Amendment Practice

This examiner enters after-final amendments leading to allowance in 32.4% of cases where such amendments are filed. This entry rate is in the 47% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.

Pre-Appeal Conference Effectiveness

When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 9% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.

Appeal Withdrawal and Reconsideration

This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 90% percentile among all examiners. Of these withdrawals, 50.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.

Petition Practice

When applicants file petitions regarding this examiner's actions, 44.4% are granted (fully or in part). This grant rate is in the 37% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.

Examiner Cooperation and Flexibility

Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 17% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.

Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 23% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.

Prosecution Strategy Recommendations

Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:

  • RCEs are effective: This examiner has a high allowance rate after RCE compared to others. If you receive a final rejection and have substantive amendments or arguments, an RCE is likely to be successful.
  • Appeal filing as negotiation tool: This examiner frequently reconsiders rejections during the appeal process. Filing a Notice of Appeal may prompt favorable reconsideration during the mandatory appeal conference.

Relevant MPEP Sections for Prosecution Strategy

  • MPEP § 713.10: Examiner interviews - available before Notice of Allowance or transfer to PTAB
  • MPEP § 714.12: After-final amendments - may be entered "under justifiable circumstances"
  • MPEP § 1002.02(c): Petitionable matters to Technology Center Director
  • MPEP § 1004: Actions requiring primary examiner signature (allowances, final rejections, examiner's answers)
  • MPEP § 1207.01: Appeal conferences - mandatory for all appeals
  • MPEP § 1214.07: Reopening prosecution after appeal

Important Disclaimer

Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.

No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.

Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.

Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.