Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18869365 | SYSTEM AND METHOD FOR AUTHORISING THE PRESENTATION OF A DIGITAL ASSET | November 2024 | March 2026 | Allow | 16 | 0 | 0 | No | No |
| 18903145 | SYSTEMS AND METHODS FOR CONTROLLING DATA EXPOSURE USING ARTIFICIAL- INTELLIGENCE-BASED MODELING | October 2024 | February 2026 | Allow | 16 | 0 | 0 | No | No |
| 18902050 | SYSTEM AND METHOD FOR PROVIDING ADVANCED NEURON-LEVEL VULNERABILITY ANALYSIS IN NEURAL NETWORK-BASED MODELS | September 2024 | January 2026 | Allow | 16 | 0 | 0 | No | No |
| 18774364 | NETWORKING AND SECURITY SPLIT ARCHITECTURE | July 2024 | March 2026 | Allow | 20 | 1 | 0 | No | No |
| 18716504 | LOW-LATENCY MULTI-DOMAIN MASKING | June 2024 | November 2025 | Allow | 17 | 0 | 0 | No | No |
| 18663554 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING SYSTEM | May 2024 | September 2025 | Allow | 16 | 0 | 0 | No | No |
| 18646548 | SELF-ATTESTING SECURE BLUEPRINTS | April 2024 | November 2025 | Allow | 18 | 0 | 0 | No | No |
| 18636354 | EMBEDDED DEVICE FOR CONTROL OF DATA EXPOSURE | April 2024 | December 2025 | Allow | 20 | 1 | 0 | Yes | No |
| 18625529 | METHOD AND SYSTEM FOR QUANTUM KEY DISTRIBUTION (QKD) WITHIN BLOCKCHAIN PLATFORMS | April 2024 | August 2025 | Allow | 16 | 0 | 0 | No | No |
| 18430853 | SET UP AND DISTRIBUTION OF POST-QUANTUM SECURE PRE-SHARED KEYS USING EXTENDIBLE AUTHENTICATION PROTOCOL | February 2024 | February 2026 | Abandon | 25 | 1 | 0 | No | No |
| 18429369 | Systems for Quantum Cyber Resilience of Digital Assets | January 2024 | August 2025 | Allow | 19 | 1 | 0 | No | No |
| 18416494 | APPARATUS AND METHOD FOR CRYPTOGRAPHY SECURE AGAINST SIDE-CHANNEL ATTACKS | January 2024 | March 2026 | Allow | 25 | 1 | 0 | Yes | No |
| 18389730 | Threat Disposition Analysis and Modeling Using Supervised Machine Learning | December 2023 | February 2025 | Allow | 14 | 1 | 0 | No | No |
| 18558272 | UPGRADING CONTROL PLANE NETWORK FUNCTIONS WITH PROACTIVE ANOMALY DETECTION CAPABILITIES | October 2023 | March 2026 | Allow | 28 | 1 | 0 | No | No |
| 18492277 | SYSTEMS AND METHODS FOR PROVIDING USER AUTHENTICATION FOR QUANTUM-ENTANGLED COMMUNICATIONS IN A CLOUD ENVIRONMENT | October 2023 | March 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18464538 | SYSTEM AND METHOD FOR USING RADIO NOISE TO ASSURE USER PRESENCE WITH DEVICE BEING ACCESSED | September 2023 | December 2025 | Allow | 27 | 2 | 0 | Yes | No |
| 18359418 | BORROWER PRIVACY ENHANCEMENT FOR SHARED-LINE SOLUTIONS | July 2023 | July 2025 | Allow | 24 | 1 | 0 | No | No |
| 18226607 | OPERATIONAL TECHNOLOGY CYBER DEFENSE CLOUD SERVICES PLATFORM | July 2023 | November 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18358526 | SYSTEM FOR DETECTING FAULT INJECTION ATTACKS | July 2023 | September 2025 | Allow | 26 | 1 | 0 | No | No |
| 18358764 | Side Channel Attack Resistant Cryptographic Accelerator | July 2023 | April 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18353491 | BEHAVIORAL THREAT DETECTION ENGINE | July 2023 | March 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18341652 | DETECTING PHISHING ATTEMPTS | June 2023 | November 2024 | Allow | 17 | 0 | 0 | Yes | No |
| 18212062 | IPTV FOLLOW ME CONTENT SYSTEM AND METHOD | June 2023 | August 2024 | Allow | 14 | 1 | 0 | No | No |
| 18039756 | NEURAL NETWORK CRYPTOGRAPHY COPROCESSOR PROVIDING COUNTERMEASTURE AGAINST SIDE-CHANNEL ANALYSIS | June 2023 | April 2025 | Allow | 22 | 0 | 0 | Yes | No |
| 18317138 | SYSTEM AND METHOD FOR AUTOMATIC SELECTION OF CARRIER PROFILES IN A MOBILE PHONE | May 2023 | August 2025 | Abandon | 27 | 1 | 0 | No | No |
| 18315387 | STORAGE SERVICE FOR SENSITIVE CUSTOMER DATA | May 2023 | September 2025 | Allow | 28 | 2 | 0 | Yes | No |
| 18308004 | MOBILE SUBSCRIBER IDENTITY ROTATION | April 2023 | February 2025 | Allow | 21 | 0 | 0 | No | No |
| 18139295 | ACCESS PREDICTION SERVICE RECEIVING AUTHENTICATION JOURNEY CHARACTERISTICS FOR SUPERVISED LEARNING | April 2023 | May 2025 | Allow | 24 | 1 | 0 | No | No |
| 18130425 | METHODS AND SYSTEMS OF A PACKET ORCHESTRATION TO PROVIDE DATA ENCRYPTION AT THE IP LAYER, UTILIZING A DATA LINK LAYER ENCRYPTION SCHEME | April 2023 | July 2025 | Allow | 27 | 1 | 0 | No | No |
| 18116774 | POLICY ENFORCEMENT USING HOST PROFILE | March 2023 | March 2025 | Allow | 24 | 2 | 0 | Yes | No |
| 18173519 | SEED GENERATION FOR CRYPTOGRAPHIC SYNCHRONIZATION WITHIN FEDERATED QUANTUM COMPUTING ENVIRONMENTS | February 2023 | February 2025 | Allow | 24 | 0 | 0 | No | No |
| 18102015 | One-Shot Challenge to Search and Access Unredacted Vaulted Electronic Communications | January 2023 | March 2025 | Allow | 26 | 1 | 0 | No | No |
| 18159894 | SYSTEM AND METHOD FOR MANAGING COMPATIBILITY OF MODULES OF DATA PROCESSING SYSTEMS | January 2023 | October 2024 | Allow | 21 | 0 | 0 | No | No |
| 18097738 | SCREEN-ANALYSIS BASED DEVICE SECURITY | January 2023 | January 2025 | Allow | 24 | 2 | 0 | Yes | No |
| 18005554 | PAYLOAD ASSURANCE AT MULTIPLE NETWORK BOUNDARIES | January 2023 | August 2025 | Allow | 31 | 1 | 0 | No | No |
| 18149460 | MESSAGE ENCRYPTION METHOD AND ELECTRONIC DEVICE | January 2023 | July 2025 | Allow | 30 | 2 | 0 | No | No |
| 18148918 | COMMUNICATION APPARATUS, COMMUNICATION METHOD, AND STORAGE MEDIUM | December 2022 | May 2025 | Allow | 29 | 2 | 0 | No | No |
| 17989886 | INTEGRATING SECURITY AND ROUTING POLICIES IN WIRELESS TELECOMMUNICATION NETWORKS | November 2022 | September 2024 | Allow | 22 | 0 | 0 | No | No |
| 18054219 | SET UP AND DISTRIBUTION OF POST-QUANTUM SECURE PRE-SHARED KEYS USING EXTENDIBLE AUTHENTICATION PROTOCOL | November 2022 | October 2023 | Allow | 11 | 1 | 0 | Yes | No |
| 17938892 | BINDING SECURE KEYS OF SECURE GUESTS TO A HARDWARE SECURITY MODULE | October 2022 | June 2024 | Allow | 20 | 1 | 0 | Yes | No |
| 17960084 | METHOD AND SYSTEM FOR DETECTING OUTLIERS IN PROCESSES | October 2022 | January 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 17937216 | SECURITY SYSTEM FOR HARDENING A DIGITAL SYSTEM AGAINST MALWARE AND METHOD OF OPERATION | September 2022 | March 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17907378 | METHOD FOR SECURELY PROCESSING DIGITAL INFORMATION IN A SECURE ELEMENT | September 2022 | March 2025 | Allow | 30 | 1 | 0 | No | No |
| 17931563 | SYSTEMS AND METHODS FOR CONTROLLING DATA EXPOSURE USING ARTIFICIAL- INTELLIGENCE-BASED MODELING | September 2022 | June 2024 | Allow | 22 | 1 | 0 | No | No |
| 17910696 | CONTROL OF ACCESS TO RESOURCES OF DATA OBJECTS | September 2022 | March 2026 | Allow | 42 | 4 | 0 | No | No |
| 17902388 | Factoring Large Integers | September 2022 | December 2023 | Allow | 16 | 1 | 0 | Yes | No |
| 17898902 | KEY MANAGEMENT DEVICE, QUANTUM CRYPTOGRAPHY COMMUNICATION SYSTEM, AND COMPUTER PROGRAM PRODUCT | August 2022 | October 2024 | Allow | 26 | 1 | 0 | No | No |
| 17894532 | ON THE FLY CERTIFICATE GENERATION | August 2022 | July 2025 | Abandon | 35 | 2 | 0 | No | No |
| 17894801 | QUANTUM SECURE DIRECT COMMUNICATION WITH MUTUAL AUTHENTICATION VIA ROTATION OF AN ARBITRARY BASIS | August 2022 | January 2025 | Abandon | 29 | 1 | 0 | No | No |
| 17797003 | AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND RECORDING MEDIUM | August 2022 | October 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17862140 | DYNAMIC DECISION ENGINE FOR SOFTWARE AUTHORITY TO OPERATE | July 2022 | August 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17789143 | DEVICE SHARING METHOD AND ELECTRONIC DEVICE | June 2022 | May 2024 | Allow | 23 | 0 | 0 | No | No |
| 17805222 | Encrypting E-mail and Other Digital Data | June 2022 | December 2024 | Allow | 31 | 2 | 0 | No | No |
| 17746150 | SYSTEMS AND METHODS FOR MANAGING TELECOMMUNICATIONS | May 2022 | November 2023 | Abandon | 18 | 1 | 0 | No | No |
| 17744790 | VEHICLE NETWORK HASHING | May 2022 | April 2025 | Abandon | 35 | 2 | 0 | Yes | No |
| 17740205 | ZERO-TRUST DECENTRALIZED CYBERSECURITY ARCHITECTURE FOR ENDPOINT DEVICES | May 2022 | November 2024 | Abandon | 30 | 1 | 0 | No | No |
| 17739968 | SEMI-SUPERVISED FRAMEWORK FOR PURPOSE-ORIENTED ANOMALY DETECTION | May 2022 | July 2024 | Allow | 26 | 1 | 0 | No | No |
| 17740159 | DELEGATION BASED ACCESS TO SECURE SYSTEMS | May 2022 | March 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17739307 | SYSTEM AND METHOD FOR PROVIDING DATA AUTHENTICATION FOR LONG RANGE COMMUNICATIONS | May 2022 | July 2025 | Allow | 38 | 3 | 0 | Yes | No |
| 17740154 | INTER SYSTEM POLICY FEDERATION IN A DATA-DRIVEN SECURE AND SAFE COMPUTING ENVIRONMENT | May 2022 | August 2024 | Allow | 28 | 0 | 1 | Yes | No |
| 17730606 | SYSTEMS AND METHODS FOR PROVIDING USER AUTHENTICATION FOR QUANTUM-ENTANGLED COMMUNICATIONS IN A CLOUD ENVIRONMENT | April 2022 | July 2023 | Allow | 14 | 0 | 0 | No | No |
| 17721714 | MANAGING ADMISSION OF UNRECOGNIZED DEVICES ONTO AN ENTERPRISE NETWORK | April 2022 | October 2024 | Allow | 30 | 4 | 0 | Yes | No |
| 17715751 | SYSTEM AND METHOD FOR GENERATING A BLOCK IN A BLOCKCHAIN NETWORK USING A VOICE-BASED HASH VALUE GENERATED BY A VOICE SIGNATURE | April 2022 | September 2024 | Allow | 30 | 2 | 0 | No | No |
| 17687958 | SECURING ENDPOINTS IN A HETEROGENOUS ENTERPRISE NETWORK | March 2022 | November 2025 | Allow | 45 | 4 | 0 | Yes | No |
| 17651200 | QUANTUM CRYPTOGRAPHIC COMMUNICATION SYSTEM, KEY MANAGEMENT INSPECTION DEVICE, KEY MANAGEMENT INSPECTION METHOD, AND COMPUTER PROGRAM PRODUCT | February 2022 | January 2024 | Allow | 23 | 0 | 0 | No | No |
| 17592254 | SYSTEMS AND METHODS FOR ENCRYPTION IN NETWORK COMMUNICATION | February 2022 | April 2023 | Allow | 15 | 0 | 0 | No | No |
| 17589868 | METHOD AND SYSTEM OF MONITORING AND CONTROLLING EXFILTRATION OF ENTERPRISE DATA ON CLOUD | January 2022 | January 2025 | Allow | 35 | 3 | 0 | Yes | No |
| 17565155 | DETECTING MALICIOUS QUERIES USING SYNTAX METRICS | December 2021 | June 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17559966 | NETWORKING AND SECURITY SPLIT ARCHITECTURE | December 2021 | April 2024 | Allow | 28 | 2 | 0 | Yes | No |
| 17558299 | METHODS, SYSTEMS, AND COMPUTER-READABLE STORAGE MEDIA FOR ORGANIZING AN ONLINE MEETING | December 2021 | August 2024 | Allow | 32 | 1 | 0 | No | No |
| 17619874 | AMF REALLOCATION HANDLING USING UE EXCEPTIONS TO SECURITY CONTEXT RULES | December 2021 | October 2023 | Allow | 22 | 1 | 0 | No | No |
| 17549695 | METHOD AND SYSTEM FOR SECURE INFORMATION DISTRIBUTION BASED ON GROUP SHARED KEY | December 2021 | November 2023 | Allow | 23 | 0 | 0 | No | No |
| 17548089 | System and Method for Intrusion Detection of Malware Traffic | December 2021 | September 2025 | Allow | 45 | 3 | 0 | No | No |
| 17612992 | SECURE BUILDING SERVICES NETWORK | November 2021 | August 2024 | Abandon | 33 | 0 | 1 | No | No |
| 17526905 | Anti-Theft Computer Hardware and Software | November 2021 | December 2023 | Allow | 25 | 2 | 0 | No | No |
| 17524972 | SYSTEM AND DEVICES FOR SECURE AND EFFICIENT PROVISIONING OF ELECTRONIC DEVICES | November 2021 | October 2023 | Abandon | 23 | 1 | 0 | No | No |
| 17449487 | DELAYED QUANTUM KEY-DISTRIBUTION | September 2021 | November 2023 | Allow | 26 | 1 | 0 | Yes | No |
| 17483040 | VOLTAGE ATTACK DETECTION CIRCUIT AND CHIP | September 2021 | January 2024 | Allow | 27 | 2 | 0 | No | No |
| 17478579 | POLYNOMIAL MULTIPLICATION FOR SIDE-CHANNEL PROTECTION IN CRYPTOGRAPHY | September 2021 | June 2023 | Allow | 21 | 1 | 0 | No | No |
| 17459695 | SYSTEMS, DEVICES, AND METHODS FOR PROVIDING A SECURE CLIENT | August 2021 | April 2025 | Abandon | 44 | 4 | 0 | Yes | No |
| 17384255 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM | July 2021 | November 2024 | Abandon | 40 | 1 | 0 | No | No |
| 17377303 | SET UP AND DISTRIBUTION OF POST-QUANTUM SECURE PRE-SHARED KEYS USING EXTENDIBLE AUTHENTICATION PROTOCOL | July 2021 | August 2022 | Allow | 13 | 0 | 0 | Yes | No |
| 17371077 | METHODS AND APPARATUS FOR ENCRYPTING CAMERA MEDIA | July 2021 | March 2023 | Allow | 20 | 1 | 0 | Yes | No |
| 17334624 | Embedded Device for Control of Data Exposure | May 2021 | January 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17297343 | SYSTEMS AND METHODS FOR EFFICIENT AND SECURE PROCESSING, ACCESSING AND TRANSMISSION OF DATA VIA A BLOCKCHAIN NETWORK | May 2021 | July 2024 | Allow | 37 | 2 | 0 | No | No |
| 17307870 | SYSTEMS AND METHODS FOR DATA ACCESS CONTROL OF PERSONAL USER DATA USING A SHORT-RANGE TRANSCEIVER | May 2021 | May 2024 | Allow | 37 | 3 | 0 | No | No |
| 17290729 | MULTI-LEVEL AUTHENTICATION FOR SHARED DEVICE | April 2021 | July 2023 | Allow | 26 | 2 | 0 | No | No |
| 17238340 | APPLICATION PROGRAMMING INTERFACE (API) CALL SECURITY | April 2021 | May 2023 | Abandon | 25 | 2 | 0 | Yes | No |
| 17221291 | Verified Quantum Random Number Generation for Cryptographic Applications | April 2021 | October 2023 | Allow | 31 | 2 | 0 | Yes | No |
| 17217774 | PAIRING-LESS DEVICE CONNECTIVITY | March 2021 | January 2025 | Allow | 46 | 5 | 0 | No | No |
| 17216099 | ROUTER FIREWALL | March 2021 | July 2023 | Allow | 28 | 2 | 0 | No | No |
| 17156931 | METHODS AND SYSTEMS FOR IDENTIFYING AND AUTHORIZING A USER BASED ON A MINI-GAME LOGIN | January 2021 | May 2024 | Abandon | 40 | 4 | 0 | Yes | No |
| 17154026 | APPARATUS AND METHODS FOR SECURELY DELIVERING DIGITAL CONTENT | January 2021 | June 2023 | Allow | 28 | 2 | 0 | Yes | No |
| 17154764 | TECHNIQUES FOR SECURING COMPUTING INTERFACES | January 2021 | October 2024 | Allow | 44 | 3 | 0 | No | No |
| 17259410 | INCREMENTAL ASSESSMENT OF INTEGER DATASETS | January 2021 | June 2024 | Allow | 42 | 2 | 0 | No | No |
| 17109035 | SECURE PASSWORD STORAGE SYSTEM AND METHOD | December 2020 | September 2022 | Abandon | 21 | 1 | 0 | No | No |
| 17107827 | SYSTEMS AND METHODS FOR BIOMETRIC ELECTRONIC SIGNATURE AGREEMENT AND INTENTION | November 2020 | January 2023 | Allow | 26 | 1 | 0 | Yes | No |
| 16950314 | PROTECTING CLOUD APPLICATION SECRET KEY WITH MULTI-PARTY COMPUTATION ALGORITHM | November 2020 | March 2024 | Allow | 40 | 4 | 0 | Yes | No |
| 17078455 | VULNERABILITY AND ATTACK TECHNIQUE ASSOCIATION | October 2020 | November 2023 | Allow | 36 | 2 | 0 | Yes | No |
| 17064213 | SCREEN-ANALYSIS BASED DEVICE SECURITY | October 2020 | November 2022 | Allow | 25 | 2 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner DOAN, TRANG T.
With a 53.8% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 40.3% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner DOAN, TRANG T works in Art Unit 2431 and has examined 599 patent applications in our dataset. With an allowance rate of 83.3%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 36 months.
Examiner DOAN, TRANG T's allowance rate of 83.3% places them in the 57% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by DOAN, TRANG T receive 2.49 office actions before reaching final disposition. This places the examiner in the 73% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by DOAN, TRANG T is 36 months. This places the examiner in the 35% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +18.1% benefit to allowance rate for applications examined by DOAN, TRANG T. This interview benefit is in the 60% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 29.0% of applications are subsequently allowed. This success rate is in the 54% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 34.5% of cases where such amendments are filed. This entry rate is in the 51% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 128.6% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 84% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.
This examiner withdraws rejections or reopens prosecution in 79.0% of appeals filed. This is in the 71% percentile among all examiners. Of these withdrawals, 51.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 45.6% are granted (fully or in part). This grant rate is in the 39% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 6.3% of allowed cases (in the 88% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.