Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18634199 | Non-Persistent Data Caching Web Server | April 2024 | December 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18516088 | RANDOM NUMBER GENERATION SYSTEMS AND METHODS | November 2023 | August 2024 | Allow | 9 | 0 | 0 | No | No |
| 18478002 | PHYSICALLY UNCLONABLE FUNCTIONS USING PULSE WIDTH CHAOTIC MAPS | September 2023 | January 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18341658 | DATA COMPLIANCE MANAGEMENT IN RECORDING CALLS | June 2023 | January 2024 | Allow | 7 | 0 | 0 | No | No |
| 18199234 | METHOD AND SYSTEM FOR COMMUNICATION VIA A CELLUAR COMMUNICATION DEVICE VIA A SECURE USER INTERFACE | May 2023 | April 2025 | Allow | 23 | 0 | 0 | No | No |
| 18320028 | MASKED INFINITY NORM CHECK FOR CRYSTALS-DILITHIUM SIGNATURE GENERATION | May 2023 | April 2025 | Allow | 23 | 1 | 0 | No | No |
| 18179385 | MACHINE LEARNING ATTACK RESISTANT STRONG PUF WITH DUAL-EDGE SAMPLING FUNCTION | March 2023 | December 2024 | Allow | 21 | 0 | 0 | No | No |
| 18041367 | SERVICE REGISTRATION METHOD AND DEVICE | February 2023 | December 2024 | Allow | 22 | 0 | 0 | No | No |
| 18157724 | FIND/VERIFY UE PROVIDED LOCATION BY NTN NETWORKS | January 2023 | May 2025 | Allow | 28 | 1 | 0 | No | No |
| 18093321 | PERSONAL INFORMATION SECURITY SYSTEM AND METHOD THEREOF ENSURING IRREVERSIBILITY AND SIMILARITY | January 2023 | April 2025 | Allow | 28 | 1 | 0 | No | No |
| 18000670 | SECURING THE CONNECTION BETWEEN A VEHICLE AND A REMOTE MANAGEMENT SERVER FOR MANAGING SAID VEHICLE | December 2022 | January 2025 | Allow | 25 | 1 | 0 | No | No |
| 18064563 | ACCELERATED REASONING GRAPH EVALUATION | December 2022 | February 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18076615 | APPARATUS AND METHOD FOR DETECTING ERRORS DURING DATA ENCRYPTION | December 2022 | December 2024 | Allow | 24 | 0 | 1 | No | No |
| 17992085 | ALARM PROCESSING METHOD AND APPARATUS, ELECTRONIC DEVICE, COMPUTER PROGRAM PRODUCT, AND COMPUTER-READABLE STORAGE MEDIUM | November 2022 | February 2025 | Allow | 37 | 1 | 0 | Yes | No |
| 17956190 | SYSTEMS AND METHODS FOR ENHANCED HASH TRANSFORMS | September 2022 | November 2023 | Allow | 14 | 1 | 0 | No | No |
| 17934862 | SECURE COMMUNICATION WITH RANDOM NUMBERS | September 2022 | January 2024 | Allow | 15 | 1 | 0 | Yes | No |
| 17944317 | BEHAVIORAL THREAT DETECTION ENGINE | September 2022 | July 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 17823256 | Opentelemetry Security Systems and Methods | August 2022 | August 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17862193 | SYSTEMS AND METHODS FOR REDUCING ALERT FATIGUE DURING OPERATION OF CYBER-PHYSICAL SYSTEMS | July 2022 | April 2025 | Allow | 33 | 1 | 0 | Yes | No |
| 17723191 | SHARING OF FIREWALL RULES AMONG MULTIPLE WORKLOADS IN A HYPERVISOR | April 2022 | April 2024 | Allow | 24 | 1 | 0 | No | No |
| 17689378 | FALLBACK SEGMENTATION SECURITY | March 2022 | April 2024 | Allow | 25 | 0 | 0 | No | No |
| 17589564 | SYSTEM AND METHOD FOR SECURING A COMMUNICATION NETWORK | January 2022 | November 2023 | Abandon | 21 | 1 | 0 | Yes | No |
| 17573942 | METHOD FOR PROVIDING END-TO-END SECURITY OVER SIGNALING PLANE IN MISSION CRITICAL DATA COMMUNICATION SYSTEM | January 2022 | July 2023 | Allow | 18 | 1 | 0 | No | No |
| 17572153 | PHYSICALLY UNCLONABLE FUNCTIONS USING PULSE WIDTH CHAOTIC MAPS | January 2022 | June 2023 | Allow | 18 | 1 | 0 | Yes | No |
| 17569891 | SECURE BOOTSTRAPPING OF CLIENT DEVICE WITH TRUSTED SERVER PROVIDED BY UNTRUSTED CLOUD SERVICE | January 2022 | April 2023 | Allow | 16 | 1 | 0 | Yes | No |
| 17564274 | LOGICAL SWITCH LEVEL LOAD BALANCING OF L2VPN TRAFFIC | December 2021 | October 2024 | Allow | 33 | 1 | 0 | No | No |
| 17561868 | APPARATUS AND METHOD FOR TRAFFIC SECURITY PROCESSING IN 5G MOBILE EDGE COMPUTING SLICING SERVICE | December 2021 | April 2024 | Allow | 27 | 1 | 0 | No | No |
| 17533049 | Use Of Random Entropy In Cryptography | November 2021 | June 2023 | Allow | 19 | 2 | 0 | Yes | No |
| 17528452 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD OF INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM | November 2021 | November 2023 | Allow | 24 | 0 | 0 | Yes | No |
| 17509876 | BINARY IMAGE STACK COOKIE PROTECTION | October 2021 | August 2023 | Allow | 22 | 2 | 0 | Yes | No |
| 17451222 | METHOD FOR VALIDATING MAN-IN-THE-MIDDLE ATTACK FOR CELLULAR CONTROL PLANE PROTOCOLS AND THE SYSTEM THEREOF | October 2021 | June 2024 | Abandon | 32 | 1 | 0 | No | No |
| 17392332 | COMBINING REGULAR AND SYMBOLIC NTTS USING CO-PROCESSORS | August 2021 | September 2023 | Allow | 25 | 1 | 0 | No | No |
| 17372181 | DATA COMPLIANCE MANAGEMENT IN RECORDING CALLS | July 2021 | March 2023 | Allow | 20 | 1 | 0 | No | No |
| 17363357 | SECURE DEVICE SHARING | June 2021 | July 2023 | Allow | 24 | 1 | 0 | Yes | No |
| 17327128 | SYSTEM FOR ASSIGNING AND DISTRIBUTING DEVICE SECURITY SEGMENT IDENTIFICATION | May 2021 | March 2024 | Allow | 34 | 1 | 0 | Yes | No |
| 17317043 | Risk Assessment of a Container Build | May 2021 | August 2023 | Allow | 27 | 0 | 0 | Yes | No |
| 17215140 | INFORMATION PROCESSING ARCHITECTURE FOR IMPLEMENTATION IN A VEHICLE | March 2021 | March 2024 | Allow | 36 | 2 | 0 | Yes | No |
| 17158590 | DUAL-LINK WIRELESS AD HOC NETWORK AND SECURITY DEFENSE METHOD IN EMERGENCY SCENE | January 2021 | April 2023 | Allow | 26 | 1 | 0 | No | No |
| 17143762 | DATA PROCESSING SYSTEM AND METHOD FOR PROTECTING DATA IN THE DATA PROCESSING SYSTEM | January 2021 | April 2024 | Allow | 39 | 3 | 0 | No | No |
| 17134635 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR UTILIZING NETWORK FUNCTION IDENTIFIERS TO IMPLEMENT INGRESS MESSAGE RATE LIMITING | December 2020 | November 2023 | Allow | 35 | 2 | 0 | Yes | No |
| 17126070 | MULTILAYER ENCRYPTION FOR USER PRIVACY COMPLIANCE AND CORPORATE CONFIDENTIALITY | December 2020 | April 2024 | Allow | 39 | 2 | 0 | Yes | No |
| 17109321 | Non-Persistent Data Caching Web Server | December 2020 | January 2024 | Allow | 38 | 1 | 0 | Yes | No |
| 17066179 | DATA PROCESSING SYSTEM AND METHOD FOR ACCESSING DATA IN THE DATA PROCESSING SYSTEM | October 2020 | July 2023 | Allow | 33 | 1 | 0 | No | No |
| 17039773 | ENHANCED N-LAYER SSO CONTROLLED AUTHENTICATION FOR ENTERPRISE DEVICES | September 2020 | August 2023 | Allow | 34 | 1 | 0 | Yes | No |
| 17013847 | SYSTEMS AND METHODS FOR DELIVERING MESSAGES OVER A NETWORK | September 2020 | September 2023 | Allow | 37 | 2 | 0 | No | No |
| 17005390 | NUMBER-THEORETIC TRANSFORM PROCESSING APPARATUS, NUMBER-THEORETIC TRANSFORM PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT | August 2020 | November 2023 | Allow | 39 | 2 | 0 | Yes | No |
| 17004211 | ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, ENCRYPTION PROGRAM PRODUCT, AND DECRYPTION PROGRAM PRODUCT | August 2020 | December 2021 | Allow | 16 | 0 | 0 | Yes | No |
| 16999614 | CLOUD SECURITY MONITORING OF APPLICATIONS IN PAAS SERVICES | August 2020 | July 2023 | Allow | 35 | 1 | 0 | Yes | No |
| 16944607 | METHOD FOR MINIMIZING THE RISK AND EXPOSURE DURATION OF IMPROPER OR HIJACKED DNS RECORDS | July 2020 | November 2022 | Allow | 27 | 2 | 0 | Yes | No |
| 16945533 | BLOCKCHAIN DATA PROTECTION BASED ON GENERIC ACCOUNT MODEL AND HOMOMORPHIC ENCRYPTION | July 2020 | December 2020 | Allow | 4 | 1 | 0 | Yes | No |
| 16858941 | SECURE DEVICE SHARING | April 2020 | March 2021 | Allow | 11 | 1 | 0 | No | No |
| 16698746 | METHOD AND SYSTEM FOR GENERATING SYNTHETIC DATA USING A REGRESSION MODEL WHILE PRESERVING STATISTICAL PROPERTIES OF UNDERLYING DATA | November 2019 | July 2023 | Allow | 43 | 1 | 0 | Yes | No |
| 16690310 | SECURE WORLD ACCESS METHOD, APPARATUS, AND SYSTEM | November 2019 | April 2023 | Abandon | 41 | 2 | 0 | No | No |
| 16684376 | DYNAMIC IPSEC POLICIES | November 2019 | July 2023 | Allow | 44 | 3 | 0 | Yes | No |
| 16681775 | ENFORCING DATA ISOLATION IN JOBS EXECUTED BY A MULTI-TENANT SYSTEM ON A SECONDARY PLATFORM | November 2019 | September 2023 | Allow | 47 | 2 | 0 | Yes | No |
| 16612085 | REFRESHING SECURITY KEYS IN 5G WIRELESS SYSTEMS | November 2019 | July 2022 | Allow | 32 | 1 | 0 | No | No |
| 16667860 | VERIFICATION OF GEOLOCATION OF DEVICES IN A CLOUD DATA CENTER | October 2019 | January 2021 | Allow | 15 | 1 | 0 | Yes | No |
| 16660974 | 5G NEW RADIO - AVOIDING REDUNDANT AS SECURITY CHECKS | October 2019 | November 2022 | Allow | 37 | 0 | 0 | Yes | No |
| 16656880 | METHOD FOR GENERATING PERSONALIZED PROFILE PACKAGE DATA FOR INTEGRATED CIRCUIT CARDS | October 2019 | July 2023 | Allow | 45 | 2 | 0 | Yes | No |
| 16568758 | EXECUTING A CRYPTOGRAPHIC OPERATION | September 2019 | June 2023 | Allow | 45 | 2 | 0 | Yes | No |
| 16481324 | METHOD FOR PROVIDING END-TO-END SECURITY OVER SIGNALING PLANE IN MISSION CRITICAL DATA COMMUNICATION SYSTEM | July 2019 | October 2021 | Allow | 26 | 0 | 0 | Yes | No |
| 16517350 | PASSWORD SECURITY | July 2019 | May 2022 | Allow | 34 | 1 | 0 | Yes | No |
| 16512612 | DEVICE AUTHENTICATION BASED UPON TUNNEL CLIENT NETWORK REQUESTS | July 2019 | February 2022 | Abandon | 31 | 1 | 0 | No | No |
| 16504348 | MANAGING DATA HANDLING POLICIES | July 2019 | March 2021 | Allow | 20 | 1 | 0 | No | No |
| 16454690 | PROTECTION AGAINST BRANCH TARGET BUFFER POISONING BY A MANAGEMENT LAYER | June 2019 | April 2023 | Allow | 45 | 1 | 0 | No | No |
| 16451235 | SECURE BOOTSTRAPPING OF CLIENT DEVICE WITH TRUSTED SERVER PROVIDED BY UNTRUSTED CLOUD SERVICE | June 2019 | October 2021 | Allow | 28 | 1 | 0 | No | No |
| 16451030 | DETERMINATION OF A MINIMAL SET OF PRIVILEGES TO EXECUTE A WORKFLOW IN A VIRTUALIZED COMPUTING ENVIRONMENT | June 2019 | July 2023 | Allow | 49 | 3 | 0 | No | No |
| 16468346 | DECODING APPARATUS, DECODING METHOD, AND PROGRAM | June 2019 | October 2021 | Allow | 28 | 1 | 0 | No | No |
| 16436879 | PHYSICALLY UNCLONABLE FUNCTIONS USING PULSE WIDTH CHAOTIC MAPS | June 2019 | October 2021 | Allow | 28 | 0 | 1 | No | No |
| 16425729 | SECURE USER AUTHENTICATION BASED ON MULTIPLE ASYMMETRIC CRYPTOGRAPHY KEY PAIRS | May 2019 | August 2021 | Allow | 26 | 1 | 0 | No | No |
| 16422853 | BLOCKCHAIN DATA PROTECTION BASED ON GENERIC ACCOUNT MODEL AND HOMOMORPHIC ENCRYPTION | May 2019 | August 2019 | Allow | 3 | 0 | 0 | No | No |
| 16412499 | SYSTEM AND METHOD OF FORMING A LOG WHEN EXECUTING A FILE WITH VULNERABILITIES IN A VIRTUAL MACHINE | May 2019 | August 2022 | Allow | 39 | 2 | 0 | No | No |
| 16413175 | DATA TRANSMISSION NETWORK DEVICE | May 2019 | April 2022 | Allow | 35 | 1 | 0 | No | No |
| 16409212 | DEEP LEARNING-BASED SIMILARITY EVALUATION IN DECENTRALIZED IDENTITY GRAPHS | May 2019 | January 2024 | Allow | 56 | 3 | 0 | Yes | No |
| 16406978 | SYSTEMS AND METHODS FOR ENHANCED HASH TRANSFORMS | May 2019 | June 2022 | Allow | 38 | 0 | 0 | No | No |
| 16403118 | RANDOM NUMBER GENERATION SYSTEMS AND METHODS | May 2019 | August 2023 | Allow | 51 | 2 | 0 | Yes | No |
| 16395562 | MOBILE DEVICE AND METHOD FOR ISOLATING AND PROTECTING A COMPUTER, NETWORKS, AND DEVICES FROM VIRUSES AND CYBER ATTACKS | April 2019 | February 2022 | Abandon | 34 | 1 | 0 | Yes | No |
| 16377292 | METHOD AND PROCESSING DEVICE FOR PERFORMING A LATTICE-BASED CRYPTOGRAPHIC OPERATION | April 2019 | September 2021 | Allow | 29 | 2 | 0 | Yes | No |
| 16368589 | DETECTING DATA ANOMALIES ON A DATA INTERFACE USING MACHINE LEARNING | March 2019 | November 2023 | Allow | 55 | 3 | 0 | Yes | No |
| 16366065 | BEHAVIORAL THREAT DETECTION ENGINE | March 2019 | June 2022 | Allow | 39 | 1 | 0 | Yes | No |
| 16365457 | SECURE COMMUNICATION WITH RANDOM NUMBERS | March 2019 | June 2022 | Allow | 39 | 1 | 0 | No | No |
| 16356965 | CHAOTIC PERMUTATION SPREAD SPECTRUM SYSTEM AND METHOD THEREFO | March 2019 | September 2021 | Abandon | 30 | 1 | 0 | No | No |
| 16352577 | SHARING OF FIREWALL RULES AMONG MULTIPLE WORKLOADS IN A HYPERVISOR | March 2019 | December 2021 | Allow | 33 | 1 | 0 | No | No |
| 16299851 | CENTRALIZED PRIVACY MANAGEMENT SYSTEM FOR AUTOMATIC MONITORING AND HANDLING OF PERSONAL DATA ACROSS DATA SYSTEM PLATFORMS | March 2019 | May 2022 | Allow | 38 | 1 | 0 | Yes | No |
| 16296457 | SECURE INTERFACE CONTROL HIGH-LEVEL PAGE MANAGEMENT | March 2019 | April 2022 | Allow | 37 | 1 | 0 | Yes | No |
| 16296308 | STORAGE SHARING BETWEEN A SECURE DOMAIN AND A NON-SECURE ENTITY | March 2019 | August 2022 | Allow | 41 | 1 | 0 | Yes | No |
| 16272584 | ACCELERATED REASONING GRAPH EVALUATION | February 2019 | July 2022 | Allow | 41 | 0 | 0 | Yes | No |
| 16271813 | Short Message Service for Internet Devices | February 2019 | July 2021 | Allow | 30 | 1 | 0 | No | No |
| 16265628 | IDENTITY AUTHENTICATION METHOD | February 2019 | April 2023 | Abandon | 51 | 2 | 0 | Yes | No |
| 16317720 | IDENTIFYING A NETWORK NODE TO WHICH DATA WILL BE REPLICATED | January 2019 | August 2022 | Allow | 43 | 2 | 0 | Yes | No |
| 16243733 | LEVERAGING MACSEC KEY AGREEMENT (MKA) STATE EVENTS TO TRIGGER FAST IGP/EGP CONVERGENCE ON MACSEC ENCRYPTED LINKS | January 2019 | April 2022 | Allow | 39 | 1 | 0 | Yes | No |
| 16241924 | SYSTEM AND METHOD FOR EMBEDDING FIRST PARTY WIDGETS IN THIRD-PARTY APPLICATIONS | January 2019 | February 2020 | Allow | 13 | 1 | 0 | No | No |
| 16216411 | SYSTEM AND METHOD FOR HYPERVISOR-BASED REMEDIATION AND PROVISIONING OF A COMPUTER | December 2018 | December 2020 | Allow | 24 | 1 | 0 | Yes | No |
| 16209843 | APPARATUS AND METHOD FOR SHARING WIFI SECURITY DATA IN AN INTERNET OF THINGS (IOT) SYSTEM | December 2018 | January 2020 | Allow | 14 | 1 | 0 | No | No |
| 16204391 | REVOCABLE STREAM CIPHERS FOR UPGRADING ENCRYPTION IN A SHARED RESOURCE ENVIRONMENT | November 2018 | April 2020 | Allow | 16 | 1 | 0 | Yes | No |
| 16186801 | ANOMALOUS NETWORK MONITORING, USER BEHAVIOR DETECTION AND DATABASE SYSTEM | November 2018 | June 2022 | Allow | 43 | 3 | 0 | Yes | No |
| 16173587 | MONITORING NETWORK PERFORMANCE OF ENCRYPTED COMMUNICATIONS | October 2018 | March 2020 | Allow | 17 | 1 | 0 | Yes | No |
| 16168159 | WEARABLE DEVICE-BASED USER AUTHENTICATION | October 2018 | June 2020 | Allow | 20 | 2 | 0 | No | No |
| 16129595 | AUTHENTICATION OF WIRELESS COMMUNICATIONS | September 2018 | February 2022 | Abandon | 41 | 2 | 0 | No | No |
| 16129321 | BINARY SOFTWARE COMPOSITION ANALYSIS | September 2018 | October 2021 | Allow | 37 | 2 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner ALMAMUN, ABDULLAH.
With a 28.6% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 25.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner ALMAMUN, ABDULLAH works in Art Unit 2431 and has examined 426 patent applications in our dataset. With an allowance rate of 80.3%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 36 months.
Examiner ALMAMUN, ABDULLAH's allowance rate of 80.3% places them in the 43% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by ALMAMUN, ABDULLAH receive 1.99 office actions before reaching final disposition. This places the examiner in the 65% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by ALMAMUN, ABDULLAH is 36 months. This places the examiner in the 17% percentile for prosecution speed. Applications take longer to reach final disposition with this examiner compared to most others.
Conducting an examiner interview provides a +24.3% benefit to allowance rate for applications examined by ALMAMUN, ABDULLAH. This interview benefit is in the 74% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 31.6% of applications are subsequently allowed. This success rate is in the 57% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 44.2% of cases where such amendments are filed. This entry rate is in the 61% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 72.7% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 57% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 78.8% of appeals filed. This is in the 67% percentile among all examiners. Of these withdrawals, 46.2% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 62.9% are granted (fully or in part). This grant rate is in the 80% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.
Examiner's Amendments: This examiner makes examiner's amendments in 1.4% of allowed cases (in the 72% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.