Prosecution Insights
Last updated: April 19, 2026
Application No. 18/574,320

LOCAL DATA PROTECTION SYSTEM

Non-Final OA §103§112
Filed
Dec 27, 2023
Examiner
GOODCHILD, WILLIAM J
Art Unit
2433
Tech Center
2400 — Computer Networks
Assignee
Namusoft Co. Ltd.
OA Round
1 (Non-Final)
83%
Grant Probability
Favorable
1-2
OA Rounds
3y 4m
To Grant
97%
With Interview

Examiner Intelligence

Grants 83% — above average
83%
Career Allow Rate
612 granted / 739 resolved
+24.8% vs TC avg
Moderate +14% lift
Without
With
+14.1%
Interview Lift
resolved cases with interview
Typical timeline
3y 4m
Avg Prosecution
18 currently pending
Career history
757
Total Applications
across all art units

Statute-Specific Performance

§101
10.1%
-29.9% vs TC avg
§103
51.0%
+11.0% vs TC avg
§102
18.4%
-21.6% vs TC avg
§112
11.4%
-28.6% vs TC avg
Black line = Tech Center average estimate • Based on career data from 739 resolved cases

Office Action

§103 §112
Notice of Pre-AIA or AIA Status The present application, filed on or after March 16, 2013, is being examined under the first inventor to file provisions of the AIA . Claim Rejections - 35 USC § 112 The following is a quotation of 35 U.S.C. 112(b): (b) CONCLUSION.—The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the inventor or a joint inventor regards as the invention. The following is a quotation of 35 U.S.C. 112 (pre-AIA ), second paragraph: The specification shall conclude with one or more claims particularly pointing out and distinctly claiming the subject matter which the applicant regards as his invention. Claims 1, 2 are rejected under 35 U.S.C. 112(b) or 35 U.S.C. 112 (pre-AIA ), second paragraph, as being indefinite for failing to particularly point out and distinctly claim the subject matter which the inventor or a joint inventor (or for applications subject to pre-AIA 35 U.S.C. 112, the applicant), regards as the invention. Regarding claims 1, 2, the phrase “even if the open requested file is a file stored in a secure storage area” is unclear if the term “even if” requires the following portions of the limitations after the term or does not require the following portions of the limitation that come after the term. Claim Rejections - 35 USC § 103 The following is a quotation of 35 U.S.C. 103 which forms the basis for all obviousness rejections set forth in this Office action: A patent for a claimed invention may not be obtained, notwithstanding that the claimed invention is not identically disclosed as set forth in section 102, if the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious before the effective filing date of the claimed invention to a person having ordinary skill in the art to which the claimed invention pertains. Patentability shall not be negated by the manner in which the invention was made. Claim(s) 1,3 is/are rejected under 35 U.S.C. 103 as being unpatentable over Don et al., (Koran Patent Application No. KR2022/0097037, Translated), hereinafter “Don”, and further in view of Stacey et al., (US Publication No. 2006/0212481), hereinafter “Stacey”. Regarding claims 1, 3, Don discloses A local data protection system comprising a data protection agent program installed on a local computing device that performs predetermined data protection functions in accordance with a preset security policy [Don, paragraphs 4-5, 27-30]; wherein, when there is a request to open a file stored on the local computing device having an extension designated as secure according to the security policy [Don, paragraphs 4-5, 27-30], the data protection agent program provides a real file that can be read and written if the file requested to be opened is a file stored in a secure storage area of the local computing device [Don, paragraphs 4-5, 27-30], and Don does not specifically disclose, however Stacey teaches a real file with a read-only file attribute that can only be read if the file requested to be opened is a file stored in a non-secure storage area of the local computing device, and wherein a fake file of read-only file attribute is generated and provided that can only be read, even if the open requested file is a file stored in a secure storage area of the local computing device when the read request program is a program not stored with the security program [Stacey, Abstract, paragraphs 42-44]. It would have been obvious to one having ordinary skill in the art before the effective filing date of the claimed invention to include Stacey’s pointers to a real file, providing the accessor with a fake file thereby allowing the user to access the file and if the user does not have the rights to the file for writing, not allowing an update. It would have been obvious to one having ordinary skill in the art to combine Stacey with Don as both arts relate to a similar concept. Claim(s) 2 is/are rejected under 35 U.S.C. 103 as being unpatentable over Don-Stacey, and further in view of Hariharan et al., (US Publication No 2016/0147722), hereinafter “Hariharan”. Regarding claim 2, Don-Stacey further discloses a local data protection system comprising a data protection agent program installed on the local computing device performing predetermined data protection functions in accordance with a preset security policy [Don, paragraphs 4-6, 27-30]; when there is an open request for a file stored on the local computing device having an extension designated as secure in accordance with the security policy, when the open requested program is designated as a secure program under the security policy [Don, paragraphs 4-5, 27-30], and provides a real file with a read-only file attribute that is readable only if the open requested file is a file stored in a non-secure storage area of the local computing device, and when the open requested program is a program not designated as a secure program, generates and provides in real time a fake file of read-only file attribute that can only be read, even if the open requested file is a file stored in a secure storage area of the local computing device [Stacey, Abstract, paragraphs 42-44]. Stacey-Don does not specifically disclose, however Hariharan teaches wherein the data protection agent program prohibits creation, modification, deletion of executable files of a secure program stored and executed on the local computing device, and prohibits copying of files from a secure storage area to a non- secure storage area, prohibits copying to the clipboard, prohibits printing output, and prohibits transferring files over a network, wherein the data protection agent program provides a real file with a read-only file attribute that is readable only if the open requested file is a file stored in a non-security storage area of the local computing device [Hariharan, paragraph 43]. It would have been obvious to one having ordinary skill in the art before the effective filing date of the claimed invention to include Don-Stacey’s pointers to a real file, and combining with Hariharan allowing or not allowing users to copy or save a file that they only have read only rights to. It would have been obvious to one having ordinary skill in the art to combine Don-Stacey with Hariharan as all arts relate to a similar concept. Conclusion Any inquiry concerning this communication or earlier communications from the examiner should be directed to WILLIAM J GOODCHILD whose telephone number is (571)270-1589. The examiner can normally be reached M-F 8am-4:30pm. Examiner interviews are available via telephone, in-person, and video conferencing using a USPTO supplied web-based collaboration tool. To schedule an interview, applicant is encouraged to use the USPTO Automated Interview Request (AIR) at http://www.uspto.gov/interviewpractice. If attempts to reach the examiner by telephone are unsuccessful, the examiner’s supervisor, Jeff Pwu can be reached at 571-272-6798. The fax phone number for the organization where this application or proceeding is assigned is 571-273-8300. Information regarding the status of published or unpublished applications may be obtained from Patent Center. Unpublished application information in Patent Center is available to registered users. To file and manage patent submissions in Patent Center, visit: https://patentcenter.uspto.gov. Visit https://www.uspto.gov/patents/apply/patent-center for more information about Patent Center and https://www.uspto.gov/patents/docx for information about filing in DOCX format. For additional questions, contact the Electronic Business Center (EBC) at 866-217-9197 (toll-free). If you would like assistance from a USPTO Customer Service Representative, call 800-786-9199 (IN USA OR CANADA) or 571-272-1000. /William J. Goodchild/Primary Examiner, Art Unit 2433
Read full office action

Prosecution Timeline

Dec 27, 2023
Application Filed
Oct 16, 2025
Non-Final Rejection — §103, §112 (current)

Precedent Cases

Applications granted by this same examiner with similar technology

Patent 12591666
DETECTING MODEL INVERSION ATTACKS IN FEDERATED LEARNING
2y 5m to grant Granted Mar 31, 2026
Patent 12587551
TECHNIQUES FOR MONITORING PRIVILEGED USERS AND DETECTING ANOMALOUS ACTIVITIES IN A COMPUTING ENVIRONMENT
2y 5m to grant Granted Mar 24, 2026
Patent 12580925
DETERMINING SECURITY RISKS ASSOCIATED WITH AN ACCESS DESIGN BASED ON ACCESS HEALTH SCORES
2y 5m to grant Granted Mar 17, 2026
Patent 12574355
Zero Trust Network Access and Virtual Private Network Client Offloading
2y 5m to grant Granted Mar 10, 2026
Patent 12574248
METHOD FOR VERIFYING DIGITAL SIGNATURES, VEHICLE COMPUTING UNIT AND VEHICLE
2y 5m to grant Granted Mar 10, 2026
Study what changed to get past this examiner. Based on 5 most recent grants.

AI Strategy Recommendation

Get an AI-powered prosecution strategy using examiner precedents, rejection analysis, and claim mapping.
Powered by AI — typically takes 5-10 seconds

Prosecution Projections

1-2
Expected OA Rounds
83%
Grant Probability
97%
With Interview (+14.1%)
3y 4m
Median Time to Grant
Low
PTA Risk
Based on 739 resolved cases by this examiner. Grant probability derived from career allow rate.

Sign in with your work email

Enter your email to receive a magic link. No password needed.

Personal email addresses (Gmail, Yahoo, etc.) are not accepted.

Free tier: 3 strategy analyses per month