Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18963464 | SYSTEM AND METHOD FOR MUXING AND STORING MANIFEST FILE IN A STORAGE SERVER | November 2024 | August 2025 | Allow | 9 | 2 | 0 | No | No |
| 18887627 | REMOTE COMPUTER NETWORK SECURITY TESTING | September 2024 | February 2025 | Allow | 5 | 0 | 0 | Yes | No |
| 18886046 | TECHNIQUES FOR SECURING IDENTITY AND ACCESS MANAGEMENT OPERATIONS VIA AGENTS AND RELAYS | September 2024 | March 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 18886094 | SELECTIVELY MASKING VIRTUAL ASSETS IN VIRTUAL ENVIRONMENTS | September 2024 | February 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18883990 | BUILDING EQUIPMENT ACCESS MANAGEMENT SYSTEM WITH DYNAMIC ACCESS CODE GENERATION TO UNLOCK EQUIPMENT CONTROL PANELS | September 2024 | December 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18800166 | MICROGRID SELF-TRIGGERING CONTROL METHOD AND SYSTEM FOR RESISTING FDI ATTACKS | August 2024 | November 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18778183 | SYSTEMS AND METHODS FOR ANALYZING SPEECH DATA TO REMOVE SENSITIVE DATA | July 2024 | October 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18762600 | APPROACHES OF ENFORCING DATA SECURITY, COMPLIANCE, AND GOVERNANCE IN SHARED INFRASTRUCTURES | July 2024 | November 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18746699 | METHOD AND SYSTEM OF COMPUTER-AUTOMATED DETECTION OF PERSONALLY IDENTIFIABLE DATA IN ELECTRONIC DATA | June 2024 | November 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18665625 | DATA MASKING | May 2024 | September 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18663208 | METHOD AND SYSTEM FOR INDIRECT SHARING OF SENSOR INSIGHTS | May 2024 | September 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18655425 | AUTOMATED ROLE-BASED ACCESS CONTROL SCOPE CHANGE | May 2024 | September 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18621751 | Generative Artificial Intelligence Model Personally Identifiable Information Detection and Protection | March 2024 | September 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18616768 | PROTECTING PRIVATE INFORMATION DURING LARGE LANGUAGE MODULE INTERACTIONS | March 2024 | October 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18691829 | APPARATUS AND METHOD FOR REMOTE ACCESS TO COMMUNICATION SYSTEMS | March 2024 | September 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18444867 | PRIVATE TEMPORARY DYNAMIC SECURE NETWORKS AND FIRST RESPONDER NETWORK INTEGRATION | February 2024 | February 2026 | Allow | 23 | 1 | 0 | Yes | No |
| 18442835 | SYSTEMS, METHODS AND APPARATUS FOR DATA PRIVACY PROTECTION BASED ON GEOFENCE NETWORKS | February 2024 | September 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18433087 | PROVIDING SECURITY WITH DYNAMIC PRIVILEGE LEVEL ASSIGNMENT IN A HYBRID-CLOUD STACK | February 2024 | January 2026 | Allow | 23 | 1 | 0 | Yes | No |
| 18425796 | CENTER APPARATUS, VEHICLE-SIDE SYSTEM, CONTENT PROTECTION METHOD, AND STORAGE MEDIUM STORING CONTENT PROTECTION PROGRAM | January 2024 | February 2026 | Allow | 24 | 1 | 1 | Yes | No |
| 18419811 | FRONT-END ENVIRONMENT SECURITY-BASED CLASSIFICATION OF ARTIFICIAL INTELLIGENCE WORKLOADS | January 2024 | November 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18577940 | PERSONAL INFORMATION PROTECTION MANAGEMENT SYSTEM FOR GENOMIC DATA | January 2024 | August 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18514184 | SYSTEM AND METHOD FOR GRADUATED DENY LIST | November 2023 | February 2026 | Abandon | 27 | 1 | 0 | Yes | No |
| 18510310 | BLOCKCHAIN DATA PROCESSING METHOD, APPARATUS, AND DEVICE, COMPUTER-READABLE STORAGE MEDIUM, AND COMPUTER PROGRAM PRODUCT | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18558699 | COMMUNICATION METHOD FOR IOT NODES OR IOT DEVICES IN A LOCAL NETWORK | November 2023 | May 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18496080 | SECURING OF AUGMENTED REALITY (AR) SYSTEMS | October 2023 | July 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18496718 | REAL-TIME ANONYMIZATION OF PRIVATE SPACES | October 2023 | August 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18496683 | SECURING OF SANDBOXED GENERATIVE AI MODELS | October 2023 | June 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18496703 | REAL-TIME ANONYMIZATION OF IMAGES AND AUDIO | October 2023 | June 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18492340 | PROTECTING MEMBERSHIP IN A SECURE MULTI-PARTY COMPUTATION AND/OR COMMUNICATION | October 2023 | February 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18486713 | RENDER HIGH WORKFLOW EXECUTION RELIABILITY USING IMMUTABLE SECURITY CONTEXT | October 2023 | July 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18486767 | SHARING ACCESS TO A PHYSICAL DEVICE WITH MULTIPLE VIRTUAL MACHINES | October 2023 | February 2026 | Allow | 28 | 0 | 0 | Yes | No |
| 18378227 | SYSTEM AND METHOD OF PRESERVING USER PRIVACY AND CONFIDENTIAL INFORMATION ON EDGE DEVICES | October 2023 | October 2025 | Allow | 24 | 1 | 0 | No | No |
| 18478844 | METHOD FOR MAINTAINING PRIVACY AND SECURITY OF DATA | September 2023 | February 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18452319 | CONTINUAL BACKUP VERIFICATION FOR RANSOMWARE DETECTION AND RECOVERY | August 2023 | January 2026 | Abandon | 29 | 1 | 0 | No | No |
| 18217163 | DATA CLEAN ROOMS USING DEFINED ACCESS WITH HOMOMORPHIC ENCRYPTION | June 2023 | May 2025 | Allow | 22 | 0 | 0 | Yes | No |
| 18216004 | PORTAL APPLICATION AS AUTHENTICATOR | June 2023 | March 2026 | Allow | 32 | 2 | 0 | No | No |
| 18210870 | SYSTEMS AND METHODS FOR CONTROLLING SIGN-ON TO WEB APPLICATIONS | June 2023 | December 2025 | Allow | 30 | 2 | 0 | Yes | No |
| 18206425 | SECURE AGGREGATION OF IOT MESSAGES | June 2023 | February 2026 | Allow | 32 | 2 | 0 | Yes | No |
| 18201399 | COMPUTER-READABLE STORAGE MEDIUM, GATEWAY FOR TRANSMITTING THE SAME, AND SOFTWARE UPDATE METHOD USING THE SAME | May 2023 | July 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18300037 | INDUSTRIAL AUTOMATION SECURE REMOTE ACCESS | April 2023 | November 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 18297530 | PROTECTING MEMBERSHIP IN A SECURE MULTI-PARTY COMPUTATION AND/OR COMMUNICATION | April 2023 | July 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 18297224 | CLIENT-SIDE VIRTUAL PRIVATE NETWORK (VPN) CHAINING | April 2023 | October 2025 | Abandon | 30 | 1 | 0 | No | No |
| 18129734 | OBTAINING TRUSTED E-SIGNATURES | March 2023 | July 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18114261 | MANAGING OWNERSHIP OF AN ELECTRONIC DEVICE | February 2023 | April 2025 | Allow | 26 | 0 | 0 | Yes | No |
| 18167607 | ACCOUNT REPLICATION INCLUDING SECURITY CONFIGURATIONS | February 2023 | December 2025 | Allow | 34 | 2 | 0 | Yes | No |
| 18103563 | TRUSTED EXECUTION ENVIRONMENT SIDE-CHANNEL PROTECTION METHOD | January 2023 | August 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 18162506 | DATA CLEAN ROOMS USING DEFINED ACCESS WITH HOMOMORPHIC ENCRYPTION | January 2023 | May 2023 | Allow | 4 | 0 | 0 | Yes | No |
| 18088284 | CORRELATING ENDPOINT AND NETWORK VIEWS TO IDENTIFY EVASIVE APPLICATIONS | December 2022 | June 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 18062127 | Scanning of Content in Weblink | December 2022 | March 2025 | Allow | 27 | 0 | 0 | Yes | No |
| 18072368 | SECURELY EXPOSING AN ACCELERATOR TO PRIVILEGED SYSTEM COMPONENTS | November 2022 | May 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 18045107 | CLIENT-SIDE VIRTUAL PRIVATE NETWORK (VPN) CHAINING | October 2022 | January 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 17959231 | OPTIMIZING COMMUNICATION IN A VIRTUAL PRIVATE NETWORK DURING BLOCKING OF AN EXIT INTERNET PROTOCOL ADDRESS | October 2022 | January 2023 | Allow | 4 | 0 | 0 | Yes | No |
| 17898176 | REPLICATION OF ACCOUNT SECURITY CONFIGURATIONS | August 2022 | November 2022 | Allow | 3 | 0 | 0 | Yes | No |
| 17821955 | MULTI-TIERED SYSTEM FOR DETECTING AND REDUCING UNAUTHORIZED NETWORK ACCESS | August 2022 | May 2025 | Allow | 33 | 1 | 0 | Yes | No |
| 17890158 | UNIQUE PATTERNS EXTRACTED FROM INVOLUNTARY EYE MOTIONS TO IDENTIFY INDIVIDUALS | August 2022 | October 2024 | Allow | 26 | 0 | 0 | Yes | No |
| 17878875 | DATA LOSS PREVENTION (DLP) FOR CLOUD RESOURCES VIA METADATA ANALYSIS | August 2022 | September 2024 | Allow | 25 | 0 | 0 | Yes | No |
| 17836923 | DATA BREACH PREVENTION AND REMEDIATION | June 2022 | February 2025 | Abandon | 33 | 1 | 0 | No | No |
| 17806067 | ENCRYPTED KNOWLEDGE GRAPH | June 2022 | October 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17745482 | GRAPH-BASED DETECTION OF NETWORK SECURITY ISSUES | May 2022 | October 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17710653 | DATA PROCESSING SYSTEMS FOR IDENTITY VALIDATION FOR CONSUMER RIGHTS REQUESTS AND RELATED METHODS | March 2022 | August 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17657165 | SECURE EXECUTION GUEST OWNER CONTROLS FOR SECURE INTERFACE CONTROL | March 2022 | April 2024 | Allow | 24 | 1 | 0 | Yes | No |
| 17764287 | COMMUNICATION METHOD, SYSTEM AND DEVICE AND COMPUTER-READABLE STORAGE MEDIUM | March 2022 | June 2023 | Allow | 15 | 0 | 0 | Yes | No |
| 17656528 | SECURE AUTHORIZATION OF ACCESS TO USER ACCOUNTS BY ONE OR MORE AUTHORIZATION MECHANISMS | March 2022 | April 2024 | Allow | 25 | 0 | 0 | Yes | No |
| 17702680 | SENSITIVE INFORMATION DISCOVERY AND TEST COMPONENT CONFIGURATION | March 2022 | November 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17655887 | ACCOUNT SECURITY CONFIGURATION REPLICATION | March 2022 | June 2022 | Allow | 3 | 0 | 0 | Yes | No |
| 17698582 | UNMANNED AERIAL VEHICLE AND APPARATUS FOR GENERATING SOURCE FILES PROVIDING CONFIDENTIAL INFORMATION PROTECTION OF UNMANNED AERIAL VEHICLE | March 2022 | October 2024 | Allow | 31 | 0 | 1 | Yes | No |
| 17690423 | Big Data Distributed Processing and Secure Data Transferring with Resource Allocation and Rebate | March 2022 | March 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17690397 | Big Data Distributed Processing and Secure Data Transferring with Resource Allocation and Rebate | March 2022 | September 2023 | Allow | 19 | 0 | 0 | Yes | No |
| 17685065 | SYSTEMS AND METHODS FOR SHARING VENDOR INFORMATION ACROSS ENTITIES IN THE WORKPLACE | March 2022 | December 2024 | Allow | 34 | 1 | 1 | Yes | No |
| 17679715 | QUESTIONNAIRE RESPONSE AUTOMATION FOR COMPLIANCE MANAGEMENT | February 2022 | May 2022 | Allow | 3 | 0 | 0 | Yes | No |
| 17670915 | DYNAMIC ACCESS POLICY PROVISIONING IN A DEVICE FOG | February 2022 | March 2025 | Allow | 37 | 3 | 0 | Yes | No |
| 17670352 | QUESTIONNAIRE RESPONSE AUTOMATION FOR COMPLIANCE MANAGEMENT | February 2022 | April 2022 | Allow | 2 | 0 | 0 | Yes | No |
| 17573999 | DATA PROCESSING SYSTEMS AND METHODS FOR BUNDLED PRIVACY POLICIES | January 2022 | April 2022 | Allow | 3 | 0 | 0 | Yes | No |
| 17572020 | SYSTEM AND METHOD FOR MANAGING NON-DIRECT URL FETCHING SERVICE | January 2022 | September 2023 | Allow | 20 | 0 | 0 | Yes | No |
| 17535065 | PRIVACY MANAGEMENT SYSTEMS AND METHODS | November 2021 | February 2022 | Allow | 3 | 0 | 0 | Yes | No |
| 17533064 | SYNTHETIC REQUEST INJECTION FOR SECURE ACCESS SERVICE EDGE (SASE) CLOUD ARCHITECTURE | November 2021 | January 2024 | Allow | 25 | 0 | 0 | Yes | No |
| 17530550 | SYSTEM AND METHOD FOR MAINTAINING GRAPHS HAVING A POLICY ENGINE AND BLOCKCHAIN | November 2021 | July 2024 | Abandon | 31 | 1 | 0 | No | No |
| 17528633 | METHOD AND SYSTEM FOR DETECTING MALICIOUS INFRASTRUCTURE | November 2021 | April 2025 | Allow | 41 | 4 | 0 | Yes | No |
| 17528423 | TRACING OBJECTS ACROSS DIFFERENT PARTIES | November 2021 | April 2025 | Abandon | 41 | 3 | 0 | Yes | No |
| 17520823 | SYSTEMS AND METHODS FOR SECURE AUTOMATED NETWORK ATTACHMENT | November 2021 | October 2023 | Allow | 24 | 0 | 0 | Yes | No |
| 17494351 | SYSTEM FOR AUTHORIZATION OF ELECTRONIC DATA ACCESS AND PROCESSING FUNCTIONS WITHIN A DISTRIBUTED SERVER NETWORK | October 2021 | October 2023 | Allow | 25 | 0 | 0 | Yes | No |
| 17599584 | SYSTEM AND METHOD FOR MANAGING NON-DIRECT URL FETCHING SERVICE | September 2021 | April 2022 | Allow | 6 | 0 | 0 | Yes | No |
| 17486542 | Simplified Deletion of Personal Private Data in Cloud Backup Storage for GDPR Compliance | September 2021 | June 2024 | Abandon | 33 | 1 | 0 | No | No |
| 17477208 | ESTABLISHING AND MAINTAINING TRUSTED RELATIONSHIP BETWEEN SECURE NETWORK DEVICES IN SECURE PEER-TO-PEER DATA NETWORK BASED ON OBTAINING SECURE DEVICE IDENTITY CONTAINERS | September 2021 | October 2022 | Allow | 13 | 0 | 0 | Yes | No |
| 17470291 | SYSTEMS, METHODS AND APPARATUS FOR DATA PRIVACY PROTECTION BASED ON GEOFENCE NETWORKS | September 2021 | October 2023 | Allow | 25 | 0 | 0 | Yes | No |
| 17467089 | SECRET SHARING INFORMATION MANAGEMENT AND SECURITY SYSTEM | September 2021 | September 2023 | Allow | 25 | 0 | 0 | Yes | No |
| 17446379 | OBFUSCATION OF A SECTION OF AUDIO BASED ON CONTEXT OF THE AUDIO | August 2021 | August 2024 | Abandon | 36 | 4 | 0 | Yes | No |
| 17446448 | INFORMATION PROCESSING APPARATUS, COMPUTER PROGRAM PRODUCT, AND INFORMATION PROCESSING SYSTEM | August 2021 | July 2023 | Allow | 23 | 1 | 0 | Yes | No |
| 17446194 | Technologies for Secure I/O with Accelerator Devices | August 2021 | April 2025 | Allow | 44 | 3 | 0 | Yes | No |
| 17409460 | Multi-Party Data Science Collaboration | August 2021 | February 2023 | Allow | 18 | 0 | 0 | Yes | No |
| 17407765 | DATA PROCESSING SYSTEMS FOR ASSESSING READINESS FOR RESPONDING TO PRIVACY-RELATED INCIDENTS | August 2021 | January 2022 | Allow | 4 | 0 | 0 | Yes | No |
| 17398246 | CREATING USER ROLES AND GRANTING ACCESS TO OBJECTS FOR USER MANAGEMENT TO SUPPORT MULTI-TENANCY IN A MULTI-CLUSTERED ENVIRONMENT | August 2021 | November 2023 | Abandon | 27 | 2 | 0 | No | No |
| 17398913 | Multi-Factor Authentication Using Positioning Data | August 2021 | October 2024 | Abandon | 38 | 2 | 0 | Yes | No |
| 17398313 | Searchable and Secure Decentralized P2P Filesystem | August 2021 | January 2022 | Allow | 5 | 0 | 0 | Yes | No |
| 17397472 | DATA PROCESSING SYSTEMS AND METHODS FOR CUSTOMIZING PRIVACY TRAINING | August 2021 | December 2021 | Allow | 4 | 0 | 0 | Yes | No |
| 17395787 | MULTI-MODAL APPROACH TO A SECURE AND CLOSED SOLUTION MONITORING AND CONTROL OF USER DATA | August 2021 | January 2024 | Allow | 29 | 3 | 0 | Yes | No |
| 17395766 | INDUSTRIAL SECURITY MODEL AS A SASE SERVICE | August 2021 | October 2023 | Allow | 26 | 2 | 0 | No | No |
| 17390153 | ESTABLISHING USER DEVICE TRUST LEVELS | July 2021 | April 2025 | Allow | 44 | 6 | 0 | Yes | No |
| 17383889 | DATA PROCESSING SYSTEMS FOR IDENTITY VALIDATION FOR CONSUMER RIGHTS REQUESTS AND RELATED METHODS | July 2021 | November 2021 | Allow | 4 | 0 | 0 | Yes | No |
| 17384165 | METHOD AND SYSTEM FOR INDIRECT SHARING OF SENSOR INSIGHTS | July 2021 | October 2023 | Allow | 27 | 3 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner CHEN, SHIN HON.
With a 27.3% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 35.8% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner CHEN, SHIN HON works in Art Unit 2431 and has examined 1,033 patent applications in our dataset. With an allowance rate of 90.7%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 26 months.
Examiner CHEN, SHIN HON's allowance rate of 90.7% places them in the 74% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by CHEN, SHIN HON receive 1.52 office actions before reaching final disposition. This places the examiner in the 27% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by CHEN, SHIN HON is 26 months. This places the examiner in the 75% percentile for prosecution speed. Applications move through prosecution relatively quickly with this examiner.
Conducting an examiner interview provides a +14.8% benefit to allowance rate for applications examined by CHEN, SHIN HON. This interview benefit is in the 54% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 33.3% of applications are subsequently allowed. This success rate is in the 71% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 35.4% of cases where such amendments are filed. This entry rate is in the 53% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 114.3% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 80% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.
This examiner withdraws rejections or reopens prosecution in 83.3% of appeals filed. This is in the 76% percentile among all examiners. Of these withdrawals, 52.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 35.6% are granted (fully or in part). This grant rate is in the 23% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 4.9% of allowed cases (in the 86% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.