Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 17129882 | PLATFORM AND METHOD OF CERTIFICATION OF AN ELECTRONIC NOTICE FOR ELECTRONIC IDENTIFICATION AND TRUST SERVICES (EIDAS) | December 2020 | March 2023 | Allow | 27 | 2 | 0 | No | No |
| 17123273 | AUTOMATED VIEWPOINT DETECTION AND SCREEN OBFUSCATION OF SECURE CONTENT | December 2020 | August 2023 | Allow | 32 | 2 | 1 | Yes | No |
| 17083785 | DATA PROVISIONING DEVICE FOR PROVISIONING A DATA PROCESSING ENTITY | October 2020 | February 2023 | Allow | 27 | 1 | 0 | No | No |
| 17080740 | Selective Deep Inspection in Security Enforcement by a Network Security System (NSS) | October 2020 | August 2023 | Allow | 33 | 3 | 0 | Yes | No |
| 16948996 | EXTERNAL SECURE AND ENCRYPTED SSD DEVICE AND A SECURE OPERATING SYSTEM ON AN EXTERNAL SSD DEVICE | October 2020 | September 2022 | Abandon | 24 | 1 | 0 | No | No |
| 17065324 | SYSTEM AND METHOD FOR IDENTIFYING UNPERMITTED DATA IN SOURCE CODE | October 2020 | December 2022 | Allow | 26 | 0 | 0 | No | No |
| 17034150 | CONTROLLED DEPLOYMENT OF BLENDED HONEYPOT SERVICES | September 2020 | March 2023 | Allow | 29 | 2 | 0 | No | No |
| 17026380 | METHOD AND SYSTEM FOR BIOMETRIC VERIFICATION | September 2020 | July 2022 | Allow | 22 | 0 | 0 | No | No |
| 16981253 | Detecting Injection Vulnerabilities of Client-Side Templating Systems | September 2020 | December 2022 | Allow | 27 | 1 | 0 | Yes | No |
| 17008786 | Fractal File Encryption Engine and Method Thereof | September 2020 | June 2023 | Abandon | 34 | 2 | 0 | No | No |
| 16985578 | EXTENSIBLE, SECURE AND EFFICIENT MONITORING AND DIAGNOSTIC PIPELINE FOR HYBRID CLOUD ARCHITECTURE | August 2020 | October 2021 | Allow | 14 | 1 | 0 | No | No |
| 16936646 | SYSTEMS AND METHODS FOR DATA MASKING AND AGGREGATION USING ONE-TIME PADS | July 2020 | March 2023 | Abandon | 32 | 2 | 0 | Yes | No |
| 16931053 | SYSTEMS AND METHODS FOR SENDING AND RECEIVING ENCRYPTED SUBMESSAGES | July 2020 | August 2022 | Allow | 25 | 2 | 0 | Yes | No |
| 16961839 | IN-VEHICLE-FUNCTION ACCESS CONTROL SYSTEM, IN-VEHICLE APPARATUS, AND IN-VEHICLE-FUNCTION ACCESS CONTROL METHOD | July 2020 | March 2023 | Abandon | 32 | 2 | 0 | No | No |
| 16919785 | DIGITAL IDENTITY NETWORK INTERFACE SYSTEM | July 2020 | December 2022 | Allow | 29 | 3 | 0 | No | No |
| 16954061 | METHOD AND APPARATUS FOR COMPUTING HASH FUNCTION | June 2020 | August 2022 | Allow | 26 | 1 | 0 | No | No |
| 16895608 | DETECTION AND IDENTIFICATION OF TARGETED ATTACKS ON A COMPUTING SYSTEM | June 2020 | January 2021 | Allow | 8 | 0 | 0 | No | No |
| 16892424 | Rule Swapping in a Packet Network | June 2020 | May 2022 | Allow | 23 | 1 | 0 | No | No |
| 16892162 | KEY UPDATE DEVICE AND STORAGE MEDIUM STORING KEY UPDATE PROGRAM | June 2020 | August 2022 | Abandon | 27 | 1 | 0 | No | No |
| 16882041 | System and Method for Managing the Multi-factor Authentication Data of a User | May 2020 | June 2022 | Allow | 24 | 2 | 0 | Yes | No |
| 16879222 | SCRUBBER FOR DISTRIBUTED DENIAL OF SERVICE ATTACKS TARGETTING MOBILE NETWORKS | May 2020 | August 2022 | Allow | 27 | 1 | 0 | Yes | No |
| 16878347 | ANOMALY ALERT SYSTEM FOR CYBER THREAT DETECTION | May 2020 | May 2022 | Allow | 24 | 1 | 0 | No | No |
| 16862250 | OPTIMAL SCANNING PARAMETERS COMPUTATION METHODS, DEVICES AND SYSTEMS FOR MALICIOUS URL DETECTION | April 2020 | December 2021 | Allow | 19 | 1 | 0 | No | No |
| 16614535 | METHOD FOR SECURING COMMUNICATION WITHOUT MANAGEMENT OF STATES | April 2020 | February 2022 | Allow | 27 | 1 | 0 | No | No |
| 16857390 | Domain Pass-Through Authentication In A Hybrid Cloud Environment | April 2020 | August 2021 | Allow | 16 | 2 | 0 | No | No |
| 16855262 | TERMINAL DEVICE PERFORMING HOMOMORPHIC ENCRYPTION, SERVER DEVICE PROCESSING CIPHERTEXT AND METHODS THEREOF | April 2020 | June 2021 | Allow | 14 | 2 | 0 | No | No |
| 16847031 | SECURITY TECHNIQUES FOR 5G AND NEXT GENERATION RADIO ACCESS NETWORKS | April 2020 | October 2022 | Allow | 30 | 1 | 0 | Yes | No |
| 16842306 | COMPACT KEY WITH REUSABLE COMMON KEY FOR ENCRYPTION | April 2020 | December 2022 | Allow | 32 | 2 | 0 | Yes | No |
| 16834961 | Graphic Pattern-Based Authentication with Adjustable Challenge Level | March 2020 | July 2022 | Allow | 27 | 1 | 0 | No | No |
| 16832488 | Latency Sensitive Tactile Network Security Interfaces | March 2020 | October 2020 | Allow | 7 | 0 | 0 | No | No |
| 16828629 | SYSTEM, METHOD, AND COMPUTER PROGRAM FOR DETECTION OF ANOMALOUS USER NETWORK ACTIVITY BASED ON MULTIPLE DATA SOURCES | March 2020 | October 2020 | Allow | 7 | 1 | 0 | No | No |
| 16826493 | MULTI-CLOUD BI-DIRECTIONAL STORAGE REPLICATION SYSTEM AND TECHNIQUES | March 2020 | March 2021 | Allow | 12 | 1 | 0 | No | No |
| 16825456 | AUTHORIZING COMMUNICATIONS BETWEEN COMPUTING NODES | March 2020 | September 2021 | Allow | 18 | 2 | 0 | No | No |
| 16646815 | SYSTEM AND METHOD FOR ANALYZING INTERNET TRAFFIC TO DETECT DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK | March 2020 | May 2024 | Abandon | 50 | 4 | 0 | No | No |
| 16802006 | MULTI-FACTOR MESSAGE-BASED AUTHENTICATION FOR NETWORK RESOURCES | February 2020 | May 2022 | Allow | 27 | 1 | 0 | Yes | No |
| 16802326 | SYSTEMS AND METHODS FOR REDUCING THE NUMBER OF OPEN PORTS ON A HOST COMPUTER | February 2020 | September 2023 | Allow | 42 | 5 | 0 | No | No |
| 16796060 | AUTHENTICATION FOR NEXT GENERATION SYSTEMS | February 2020 | September 2020 | Allow | 7 | 0 | 0 | No | No |
| 16794746 | CONFIGURABLE LATTICE CRYPTOGRAPHY PROCESSOR FOR THE QUANTUM-SECURE INTERNET OF THINGS AND RELATED TECHNIQUES | February 2020 | March 2022 | Allow | 25 | 2 | 0 | Yes | No |
| 16790222 | SECURE DEBUG ARCHITECTURE | February 2020 | May 2022 | Allow | 27 | 3 | 0 | Yes | No |
| 16773044 | TERMINAL DEVICE PERFORMING HOMOMORPHIC ENCRYPTION, SERVER DEVICE PROCESSING CIPHERTEXT AND METHODS THEREOF | January 2020 | April 2021 | Allow | 15 | 1 | 0 | No | No |
| 16750821 | SERVER BASED METHODS AND SYSTEMS FOR CONDUCTING PERSONALIZED, INTERACTIVE AND INTELLIGENT SEARCHES | January 2020 | November 2020 | Allow | 10 | 1 | 0 | Yes | No |
| 16749817 | ACCESS CONTROL USING PROOF-OF-POSSESSION TOKEN | January 2020 | April 2022 | Allow | 27 | 2 | 0 | No | No |
| 16744341 | RULE SWAPPING IN A PACKET NETWORK | January 2020 | April 2020 | Allow | 3 | 0 | 0 | No | No |
| 16734984 | Handling Encoded Information | January 2020 | June 2021 | Allow | 17 | 1 | 0 | No | No |
| 16730741 | SYSTEMS AND METHODS FOR SUBSCRIBER CERTIFICATE PROVISIONING | December 2019 | October 2021 | Allow | 22 | 1 | 0 | No | No |
| 16730551 | Advanced Asset Tracking and Correlation | December 2019 | December 2020 | Allow | 11 | 1 | 0 | No | No |
| 16725757 | METHODS AND APPARATUS TO FACILITATE MALWARE DETECTION USING COMPRESSED DATA | December 2019 | August 2022 | Allow | 32 | 3 | 0 | Yes | No |
| 16724105 | MICROPROCESSOR PIPELINE CIRCUITRY TO SUPPORT CRYPTOGRAPHIC COMPUTING | December 2019 | November 2021 | Allow | 23 | 1 | 0 | No | No |
| 16717441 | METADATA TRANSCODING | December 2019 | March 2021 | Allow | 15 | 1 | 0 | No | No |
| 16702058 | Systems and Methods for In-Session Refresh of Entitlements Associated with Web Applications | December 2019 | December 2020 | Allow | 12 | 1 | 0 | No | No |
| 16697772 | HARDWARE SECURITY MODULE, AND TRUSTED HARDWARE NETWORK INTERCONNECTION DEVICE AND RESOURCES | November 2019 | February 2022 | Allow | 27 | 1 | 0 | No | No |
| 16694361 | SECURE COMPUTING DEVICE | November 2019 | May 2023 | Allow | 42 | 4 | 0 | Yes | No |
| 16612357 | SECURE TELECOMMUNICATIONS AND TRANSACTIONAL PLATFORM | November 2019 | October 2022 | Abandon | 36 | 2 | 0 | No | No |
| 16673079 | DNS-BASED CAPTIVE PORTAL WITH INTEGRATED TRANSPARENT PROXY TO PROTECT AGAINST USER DEVICE CACHING INCORRECT IP ADDRESS | November 2019 | February 2021 | Allow | 16 | 1 | 0 | No | No |
| 16668043 | METHOD FOR DETECTING COMPUTER VIRUS, COMPUTING DEVICE, AND STORAGE MEDIUM | October 2019 | October 2021 | Allow | 24 | 1 | 0 | No | No |
| 16661909 | PERSONATED REALITY ECOSYSTEM | October 2019 | March 2020 | Allow | 4 | 1 | 0 | No | No |
| 16599677 | AUTOMATIC MASKING OF SENSITIVE DATA | October 2019 | March 2021 | Allow | 17 | 2 | 0 | No | No |
| 16595342 | DATA PROCESSING SYSTEMS FOR GENERATING AND POPULATING A DATA INVENTORY | October 2019 | November 2020 | Allow | 13 | 3 | 0 | Yes | No |
| 16603283 | DISPLAYING A BIOS UPDATE PROGRESS | October 2019 | June 2022 | Allow | 32 | 1 | 0 | No | No |
| 16591578 | SYSTEMS AND METHODS FOR SELECTING AND UTILIZING A COMMITTEE OF VALIDATOR NODES IN A DISTRIBUTED SYSTEM | October 2019 | November 2021 | Abandon | 25 | 1 | 0 | No | No |
| 16590731 | Wearable Device Cloud Authentication | October 2019 | March 2022 | Abandon | 29 | 1 | 0 | No | No |
| 16589232 | METHOD AND SYSTEM FOR DETECTING AN ATTACK ON A PHYSICALLY UNCLONABLE FUNCTION (PUF) | October 2019 | August 2021 | Allow | 23 | 2 | 0 | Yes | No |
| 16580015 | SYSTEM AND METHOD OF DETECTING MALICIOUS FILES BASED ON FILE FRAGMENTS | September 2019 | May 2022 | Allow | 32 | 3 | 0 | No | No |
| 16578741 | TARGETED VERY LONG DELAY FOR INCREASING SPECULATIVE EXECUTION PROGRESSION | September 2019 | July 2022 | Allow | 34 | 1 | 0 | Yes | No |
| 16575790 | SYSTEM AND METHOD FOR PRIVACY PRESERVATION IN CYBER THREAT | September 2019 | February 2023 | Allow | 41 | 1 | 0 | No | No |
| 16568131 | CONCURRENT ENABLEMENT OF ENCRYPTION ON AN OPERATIONAL PATH AT A HOST PORT | September 2019 | September 2021 | Allow | 24 | 1 | 0 | Yes | No |
| 16568124 | CONCURRENT ENABLEMENT OF ENCRYPTION ON AN OPERATIONAL PATH AT A STORAGE PORT | September 2019 | September 2021 | Allow | 24 | 1 | 0 | Yes | No |
| 16563737 | SECURITY METHOD FOR VEHICLE NETWORK, FIREWALL FOR THE SAME, AND COMPUTER-READABLE RECORDING MEDIUM RECORDING THE SAME | September 2019 | January 2022 | Abandon | 28 | 1 | 0 | No | No |
| 16556594 | Method Of Enrolling A Device Into A PKI Domain For Certificate Management Using Factory Key Provisioning | August 2019 | July 2021 | Allow | 23 | 2 | 0 | No | No |
| 16553318 | INTEGRATED CIRCUIT FOR SECURITY OF A PHYSICALLY UNCLONABLE FUNCTION AND A DEVICE INCLUDING THE SAME | August 2019 | April 2022 | Allow | 31 | 1 | 0 | No | No |
| 16486898 | ANONYMOUS ATTESTATION | August 2019 | February 2022 | Allow | 30 | 2 | 0 | No | No |
| 16525207 | METHOD AND SYSTEM FOR DYNAMIC TESTING WITH DIAGNOSTIC ASSESSMENT OF SOFTWARE SECURITY VULNERABILITY | July 2019 | August 2022 | Allow | 36 | 4 | 0 | No | No |
| 16478596 | TERMINAL DEVICE PERFORMING HOMOMORPHIC ENCRYPTION, SERVER DEVICE PROCESSING CIPHERTEXT AND METHODS THEREOF | July 2019 | May 2020 | Allow | 10 | 1 | 0 | No | No |
| 16504735 | SYSTEM AND METHOD FOR ACCESS CONTROL VIA MOBILE DEVICE | July 2019 | February 2021 | Allow | 19 | 1 | 0 | No | No |
| 16503596 | Filtering Personally Identifiable Information From Vehicle Data | July 2019 | March 2022 | Allow | 32 | 3 | 0 | No | No |
| 16458678 | METHOD AND APPARATUS FOR ENCRYPTING AND DECRYPTING DATA ON AN INTEGRATED CIRCUIT | July 2019 | April 2022 | Allow | 34 | 2 | 0 | No | No |
| 16469646 | Method and Device for Starting Application Based on Fingerprint Recognition | June 2019 | February 2022 | Allow | 32 | 4 | 0 | No | Yes |
| 16466749 | HUMAN CAPITAL MANAGEMENT DATA TRANSFER SYSTEMS | June 2019 | July 2021 | Allow | 25 | 2 | 0 | No | No |
| 16464286 | METHOD TO CREATE A TRUSTED POOL OF DEVICES | May 2019 | July 2021 | Allow | 26 | 1 | 0 | No | No |
| 16410859 | PROTECTING COMPUTER SYSTEMS USING MERKLE TREES AS PROOF-OF-WORK | May 2019 | March 2020 | Allow | 10 | 1 | 0 | No | No |
| 16408425 | MULTI-CLOUD BI-DIRECTIONAL STORAGE REPLICATION SYSTEM AND TECHNIQUES | May 2019 | February 2020 | Allow | 10 | 0 | 0 | Yes | No |
| 16402403 | System and Method for Supporting Multiple Identities for a Secure Identity Device | May 2019 | September 2022 | Allow | 40 | 2 | 0 | No | Yes |
| 16399291 | METHODS AND SYSTEMS FOR PREVENTING UTILIZATION OF PROBLEMATIC SOFTWARE | April 2019 | November 2022 | Allow | 42 | 2 | 0 | No | No |
| 16393870 | Encryption Card, Electronic Device, and Encryption Service Method | April 2019 | February 2022 | Abandon | 33 | 2 | 0 | Yes | No |
| 16343066 | Protecting User's Anonymity when Visiting Foreign Networks | April 2019 | November 2021 | Allow | 31 | 2 | 0 | Yes | Yes |
| 16386014 | MITIGATING COMMUNICATION AND CONTROL ATTEMPTS | April 2019 | April 2020 | Allow | 12 | 2 | 0 | Yes | No |
| 16384543 | Attack Kill Chain Generation and Utilization for Threat Analysis | April 2019 | January 2022 | Allow | 33 | 2 | 0 | No | No |
| 16384807 | PRIVILEGED ACCOUNT BREACH DETECTIONS BASED ON BEHAVIORAL ACCESS PATTERNS | April 2019 | December 2021 | Allow | 33 | 3 | 0 | Yes | No |
| 16384560 | ASSET REMEDIATION TREND MAP GENERATION AND UTILIZATION FOR THREAT MITIGATION | April 2019 | January 2022 | Allow | 33 | 2 | 0 | No | No |
| 16378865 | Information Security | April 2019 | July 2022 | Allow | 39 | 3 | 0 | Yes | No |
| 16378961 | AUTOMATION SYSTEM, SERIES TERMINAL FOR AUTOMATION SYSTEMS AND ASSOCIATED METHOD | April 2019 | October 2020 | Allow | 18 | 0 | 0 | No | No |
| 16379108 | SYSTEM AND METHOD FOR IMPLEMENTING A LOG SOURCE VALUE TOOL FOR SECURITY INFORMATION EVENT MANAGEMENT | April 2019 | June 2021 | Allow | 27 | 2 | 0 | No | No |
| 16379028 | STATISTICAL AUTOMATIC DETECTION OF MALICIOUS PACKETS IN DDOS ATTACKS USING AN ENCODING SCHEME ASSOCIATED WITH PAYLOAD CONTENT | April 2019 | October 2020 | Allow | 19 | 0 | 0 | No | No |
| 16378599 | Affectedness scoring engine for cyber threat intelligence services | April 2019 | September 2021 | Allow | 29 | 3 | 0 | No | No |
| 16368537 | OPTIMAL SCANNING PARAMETERS COMPUTATION METHODS, DEVICES AND SYSTEMS FOR MALICIOUS URL DETECTION | March 2019 | April 2020 | Allow | 12 | 2 | 0 | No | No |
| 16336953 | SECURE COMPUTATION SYSTEM, SECURE COMPUTATION APPARATUS, SECURE COMPUTATION METHOD, AND SECURE COMPUTATION PROGRAM | March 2019 | April 2021 | Allow | 24 | 0 | 0 | No | No |
| 16363211 | VERIFYING IDENTITY OF A VEHICLE ENTERING A TRUST ZONE | March 2019 | September 2021 | Allow | 30 | 2 | 0 | No | No |
| 16362218 | COMPOSABLE TRUSTWORTHY EXECUTION ENVIRONMENTS | March 2019 | February 2021 | Allow | 23 | 0 | 0 | No | No |
| 16332652 | DEVICE AND METHOD FOR VERIFYING APPLICATION | March 2019 | November 2021 | Allow | 32 | 2 | 0 | No | No |
| 16273947 | LOCATION-BASED, CONTEXT-AWARE CHALLENGE-RESPONSE AUTHENTICATION | February 2019 | September 2021 | Allow | 31 | 2 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner PYZOCHA, MICHAEL J.
With a 100.0% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 50.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner PYZOCHA, MICHAEL J works in Art Unit 2419 and has examined 167 patent applications in our dataset. With an allowance rate of 91.0%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 27 months.
Examiner PYZOCHA, MICHAEL J's allowance rate of 91.0% places them in the 76% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.
On average, applications examined by PYZOCHA, MICHAEL J receive 1.74 office actions before reaching final disposition. This places the examiner in the 34% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by PYZOCHA, MICHAEL J is 27 months. This places the examiner in the 70% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +7.5% benefit to allowance rate for applications examined by PYZOCHA, MICHAEL J. This interview benefit is in the 37% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 37.0% of applications are subsequently allowed. This success rate is in the 84% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 52.6% of cases where such amendments are filed. This entry rate is in the 79% percentile among all examiners. Strategic Recommendation: This examiner is highly receptive to after-final amendments compared to other examiners. Per MPEP § 714.12, after-final amendments may be entered "under justifiable circumstances." Consider filing after-final amendments with a clear showing of allowability rather than immediately filing an RCE, as this examiner frequently enters such amendments.
When applicants request a pre-appeal conference (PAC) with this examiner, 150.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 90% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.
This examiner withdraws rejections or reopens prosecution in 80.0% of appeals filed. This is in the 72% percentile among all examiners. Of these withdrawals, 75.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 26.1% are granted (fully or in part). This grant rate is in the 13% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.