Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19082761 | NEURAL NETWORK-BASED SECURITY DEFENSE METHOD FOR ENCRYPTED MULTIMEDIA DATA, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT | March 2025 | May 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18981637 | SYSTEM AND METHOD FOR DISTRIBUTED EDGE-CLOUD HOMOMORPHIC COMPRESSION USING ADAPTIVE NEURAL NETWORKS | December 2024 | March 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 18888656 | CODEBOOK-BASED HOMOMORPHIC ENCRYPTION FOR EFFICIENT AND PRIVACY-PRESERVING DATA PROCESSING | September 2024 | February 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18828315 | LANE SCRAMBLING OVER NETWORK COMMUNICATION CHANNELS | September 2024 | December 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18811166 | VERIFIABLE CONSENT FOR PRIVACY PROTECTION | August 2024 | March 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18809807 | ELASTIC SECURITY SERVICES LOAD BALANCING IN A WIRELESS MESH NETWORK | August 2024 | January 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18839680 | INFORMATION CONCEALING METHOD, INFORMATION PROCESSING DEVICE, AND INFORMATION PROCESSING SYSTEM | August 2024 | February 2026 | Allow | 18 | 1 | 0 | No | No |
| 18799824 | USER DEVICE CHARACTERIZATION METHOD BASED ON NETWORK DATA TRAFFIC INFORMATION, AND NETWORK ACCESS CONTROL METHOD THEREOF | August 2024 | February 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 18783154 | CELLULAR IoT SECURITY USING DYNAMIC POLICY-DRIVEN MECHANISMS FOR THREAT MITIGATION | July 2024 | September 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18772989 | ON-DEVICE DATA PRIVACY OPERATIONS TO PREVENT DATA SHARING AT USER LOCATIONS | July 2024 | February 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18755627 | CODEBOOK-BASED HOMOMORPHIC ENCRYPTION FOR EFFICIENT AND PRIVACY-PRESERVING DATA PROCESSING | June 2024 | August 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18749797 | FAULT-TO-TIME CONVERTER SENSOR FOR LOW-OVERHEAD FAULT INJECTION ATTACK MITIGATION | June 2024 | March 2026 | Allow | 21 | 0 | 0 | Yes | No |
| 18749054 | COMMUNICATION CONFIDENTIALITY METHOD FOR APPLICATIONS IN COMMUNICATION CONFIDENTIALITY SYSTEMS AND COMMUNICATION SERVERS | June 2024 | December 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18680722 | END-TO-END ENCRYPTION WITH DISTRIBUTED KEY MANAGEMENT IN A TRACKING DEVICE ENVIRONMENT | May 2024 | March 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 18678004 | INPUT/OUTPUT INTERFACE SECURITY | May 2024 | December 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18672978 | INTRUSION DETECTION USING A HEARTBEAT | May 2024 | February 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18667416 | SECURE TRAIN COMMUNICATION TECHNIQUES | May 2024 | February 2026 | Allow | 21 | 0 | 0 | Yes | No |
| 18664052 | SAMPLING FROM BINOMIAL DISTRIBUTION IN SECURE MULTI-PARTY COMPUTATION | May 2024 | September 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18652844 | SYSTEM, APPARATUS, AND METHOD FOR HARDWARE BASED CRYPTOGRAPHY | May 2024 | November 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18652305 | SECURITY DESCRIPTION FRAMEWORK | May 2024 | September 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18703394 | SECURELY EXECUTING ON A PUBLIC COMPUTER CODE THAT OPERATES ON ENCRYPTED DATA BASED ON ONE CONTIGUOUS STAGE OF LINEAR 3-BIT GATES AND A DIFFERENT STAGE OF NON-LINEAR GATES | April 2024 | October 2025 | Allow | 18 | 0 | 0 | No | No |
| 18637504 | SECURITY DEVICE AND SUBSTRATE | April 2024 | October 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18630430 | ALTERNATIVE APPROACH TO THE GENERATION OF A UNIQUE RESPONSE TO A CHALLENGE | April 2024 | August 2024 | Allow | 4 | 1 | 0 | No | No |
| 18629394 | TOURNAMENT-LEAGUE MECHANISMS FOR COMPARISON BASED COMPUTER OPERATIONS | April 2024 | September 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18628314 | SYSTEMS AND METHODS FOR SECURITY INTELLIGENCE EXCHANGE | April 2024 | August 2024 | Allow | 4 | 0 | 0 | Yes | No |
| 18696783 | ENCRYPTION OF PROGRAM INSTRUCTIONS IN A NUMERICAL CONTROL DEVICE | March 2024 | October 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18620399 | AI-GENERATED VIRTUAL FILE HONEYPOTS FOR COMPUTING SYSTEMS BEHAVIOR-BASED PROTECTION AGAINST RANSOMWARE ATTACKS | March 2024 | August 2025 | Allow | 16 | 0 | 0 | No | No |
| 18619680 | SYSTEMS AND METHODS FOR RESTORING SECURE CONNECTIONS BETWEEN DATA PROCESSING SYSTEMS AND CONTROL PLANES | March 2024 | August 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18612921 | ADVANCED DEIDENTIFICATION OF INFORMATION, SUCH AS INFORMATION ABOUT A PERSON | March 2024 | June 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18598974 | SYSTEMS AND METHODS FOR CORRELATING DECRYPTED TLS MESSAGES WITH NETWORK DATA IN REAL TIME | March 2024 | July 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18444217 | SELECTIVE INTELLIGENT OFFLOADING FOR MOBILE NETWORKS OVER DIAMETER AND/OR RADIUS PROTOCOLS | February 2024 | July 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18444203 | SELECTIVE INTELLIGENT ENFORCEMENT FOR MOBILE NETWORKS OVER DIAMETER AND/OR RADIUS PROTOCOLS | February 2024 | August 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18441215 | METHOD FOR CHECKING THE INTEGRITY OF A COMPUTE NODE | February 2024 | November 2025 | Allow | 21 | 1 | 0 | No | No |
| 18440687 | SYSTEM AND METHOD FOR FRAME PROTECTION | February 2024 | February 2026 | Allow | 24 | 1 | 0 | Yes | No |
| 18438481 | Detection of Security Attacks Through Die-Attach Pad | February 2024 | January 2026 | Allow | 23 | 1 | 0 | Yes | No |
| 18438431 | Networks Comprising Multi-Quantum Blockchain Systems, Methods, And Products | February 2024 | January 2026 | Abandon | 24 | 1 | 0 | No | No |
| 18436176 | QUANTUM KEY DISTRIBUTION | February 2024 | July 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18421500 | COMMUNICATION METHOD AND APPARATUS | January 2024 | July 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18417002 | HIGHLY-PARALLEL HARDWARE ARCHITECTURE FOR FULLY HOMOMORPHIC ENCRYPTION (FHE) AND BUTTERFLY-LIKE ALGORITHMS | January 2024 | January 2026 | Allow | 24 | 1 | 0 | Yes | No |
| 18408390 | RESTRICTING ACCESS TO APPLICATION PROGRAMMING INTERFACES (APIs) | January 2024 | August 2025 | Allow | 19 | 1 | 0 | Yes | No |
| 18575055 | ENFORCEMENT OF ATTESTATION OF READ-ONLY PROTECTED MEMORY DURING ATTESTATION VALIDITY PERIOD | December 2023 | August 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18395400 | BUSINESS EMAIL COMPROMISE DETECTION SYSTEM | December 2023 | June 2025 | Allow | 17 | 2 | 0 | Yes | No |
| 18539989 | ELLIPTIC CURVE RANDOM NUMBER GENERATION | December 2023 | February 2025 | Allow | 14 | 1 | 0 | No | No |
| 18538955 | Method and Device for Spatially Designating Private Content | December 2023 | October 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18524650 | PHYSICAL COMPUTER INTRUSION DETECTION | November 2023 | February 2026 | Allow | 26 | 1 | 0 | Yes | No |
| 18519076 | METHOD FOR AUTHENTICATING USER FOR eKYC AUTOMATION | November 2023 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18516520 | HOMOMORPHIC ENCRYPTION FOR WEB APPLICATION FIREWALL PROCESSING | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18515914 | METHOD FOR ACCELERATING BOOTSTRAPPING IN A CRYPTOGRAPHIC APPLICATION | November 2023 | August 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18506318 | SYSTEMS AND METHODS OF SECURE PIN CODE ENTRY | November 2023 | September 2024 | Allow | 11 | 1 | 0 | No | No |
| 18387261 | INFORMATION RETRIEVAL METHOD AND APPARATUS, COMPUTER DEVICE, AND STORAGE MEDIUM | November 2023 | September 2025 | Allow | 22 | 1 | 0 | No | No |
| 18386005 | ONBOARDING USING LI-FI FOR DPP BOOTSTRAPPING | November 2023 | January 2026 | Allow | 26 | 1 | 0 | Yes | No |
| 18385716 | CLASSICAL COMPUTER, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM | October 2023 | May 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18384103 | METHOD FOR PROVIDING AN ELASTIC CONTENT FILTERING SECURITY SERVICE IN A MESH NETWORK | October 2023 | June 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18491093 | UNLOCKING METHOD AND ELECTRONIC DEVICE | October 2023 | June 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18488472 | METHOD AND APPARATUS FOR SELECTING SELECTIVE SECURITY MODE AND FLOW MANAGEMENT IN A WIRELESS COMMUNICATION SYSTEM | October 2023 | November 2025 | Allow | 25 | 1 | 0 | No | No |
| 18487436 | METHOD, DEVICE, AND SYSTEM FOR PHYSICAL CHANNEL ENCRYPTION IN WIRELESS NETWORKS | October 2023 | July 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18380023 | TARGETED AUTHENTICATION QUERIES BASED ON DETECTED USER ACTIONS | October 2023 | November 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18378583 | METHOD FOR PROVIDING AN ELASTIC CONTENT FILTERING SECURITY SERVICE IN A MESH NETWORK | October 2023 | September 2024 | Allow | 11 | 1 | 0 | No | No |
| 18482819 | GLOBAL MOBILE COMMUNICATION EVENT IDS FOR IMPROVED NETWORK AND SECURITY OPERATIONS | October 2023 | July 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18478939 | DETECTION OF CYBER ATTACKS DRIVEN BY COMPROMISED LARGE LANGUAGE MODEL APPLICATIONS | September 2023 | January 2026 | Allow | 28 | 2 | 0 | Yes | Yes |
| 18374044 | SESSION TRANSFER BETWEEN PRE-REGISTERED SMART GLASSES AND COMPUTER FOR MAINTAINING A CONFIDENTIAL DATA VIEW | September 2023 | June 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18367374 | APPLICATION OF TRAINED ARTIFICIAL INTELLIGENCE PROCESSES TO ENCRYPTED DATA WITHIN A DISTRIBUTED COMPUTING ENVIRONMENT | September 2023 | April 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18464799 | CLOUD NATIVE VIRTUAL MACHINE RUNTIME PROTECTION | September 2023 | October 2024 | Allow | 13 | 1 | 0 | No | No |
| 18463556 | APPARATUS FOR PRIVACY PRESERVING TEXT SEARCH USING HOMOMORPHIC ENCRYPTION AND METHOD THEREOF | September 2023 | April 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18243992 | SYSTEMS AND METHODS FOR DISTRIBUTED AGENT-BASED MONITORING OF CRYPTOGRAPHIC KEY STORES | September 2023 | May 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18462031 | VERIFIABLE CONSENT FOR PRIVACY PROTECTION | September 2023 | June 2024 | Allow | 9 | 1 | 0 | No | No |
| 18241065 | SYSTEM FOR SECURELY MONITORING AND EXTRACTING DATA THROUGH A PRIVATE NETWORK | August 2023 | February 2025 | Allow | 17 | 1 | 0 | No | No |
| 18547295 | SECURE DATA COLLECTION VIA A MESSAGING FRAMEWORK | August 2023 | March 2026 | Allow | 31 | 1 | 1 | Yes | No |
| 18234152 | ELASTIC SECURITY SERVICES LOAD BALANCING IN A WIRELESS MESH NETWORK | August 2023 | April 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18233423 | Base Station State Detection for Client Computing Devices | August 2023 | January 2026 | Allow | 29 | 1 | 0 | No | No |
| 18449162 | END-TO-END ENCRYPTION WITH DISTRIBUTED KEY MANAGEMENT IN A TRACKING DEVICE ENVIRONMENT | August 2023 | March 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18358251 | STORAGE ARRAY PROTECTION USING SIGNED TOKEN | July 2023 | April 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18358690 | SECURE MULTI-PARTY COMPUTATION METHODS AND APPARATUSES FOR PRIVACY PROTECTION, AND COMPUTER DEVICES | July 2023 | May 2025 | Allow | 22 | 0 | 0 | Yes | No |
| 18224777 | ELECTRONIC DEVICE FOR DISPLAYING SECURITY IMAGE, AND METHOD FOR OPERATING SAME | July 2023 | January 2026 | Allow | 30 | 2 | 0 | Yes | No |
| 18225022 | SELECTIVE INTELLIGENT OFFLOADING FOR MOBILE NETWORKS USING A SECURITY PLATFORM | July 2023 | November 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18224482 | PRIVACY MANAGEMENT SYSTEMS AND METHODS FOR USER DEVICES | July 2023 | July 2025 | Allow | 24 | 1 | 0 | Yes | No |
| 18351528 | CRYPTOGRAPHIC AGILITY FOR PRIVACY-PRESERVING FEDERATED LEARNING | July 2023 | November 2025 | Abandon | 28 | 1 | 0 | No | No |
| 18348687 | Reinforcement Learning with Information Retrieval Feedback | July 2023 | March 2026 | Allow | 32 | 0 | 0 | Yes | No |
| 18342867 | USING REPUTATION TO AVOID FALSE MALWARE DETECTIONS | June 2023 | April 2024 | Allow | 10 | 1 | 0 | No | No |
| 18215767 | MANAGING AUTHORIZATION CODES FROM MULTIPLE SOURCES | June 2023 | November 2025 | Allow | 29 | 1 | 0 | No | No |
| 18343483 | SYSTEMS AND METHODS FOR PROVISIONING SECURITY POLICIES FOR DERIVING SESSION KEYS | June 2023 | November 2025 | Allow | 28 | 2 | 0 | Yes | No |
| 18342500 | METHOD AND ELECTRONIC DEVICE FOR HANDLING SECURE VIRTUAL EVENT IN VIRTUAL ENVIRONMENT | June 2023 | October 2025 | Allow | 28 | 1 | 0 | No | No |
| 18213141 | BYTE N-GRAM EMBEDDING MODEL | June 2023 | May 2024 | Allow | 11 | 1 | 0 | No | No |
| 18334888 | SAAS SECURITY CONFIGURATIONS DISTRIBUTION AND MANAGEMENT | June 2023 | July 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18256996 | ORCHESTRATED QUANTUM KEY DISTRIBUTION | June 2023 | February 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18333484 | One-Way Communication Data Diode on a Chip | June 2023 | March 2024 | Allow | 9 | 1 | 0 | No | No |
| 18255911 | QUANTUM KEY TOKEN | June 2023 | March 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18205857 | DCT-BASED WATERMARKING SCHEME FOR DEEP NEURAL NETWORKS | June 2023 | September 2023 | Allow | 4 | 0 | 0 | Yes | No |
| 18327772 | Machine Learning-Based Technique for Model Provenance | June 2023 | August 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 18314573 | LEVEL SENSOR FOR ACTIVATING AND DEACTIVATING A SAFE OPERATING STATE | May 2023 | December 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 18140205 | SECURING ACCESS TO A VIRTUAL MACHINE VIA A SERVICE PROCESSOR USING A KEY | April 2023 | January 2026 | Allow | 32 | 2 | 0 | No | No |
| 18132247 | TETRA SYSTEMS AND METHODS FOR CLUSTERING FILES BASED UPON STRUCTURE | April 2023 | June 2025 | Allow | 26 | 1 | 0 | No | No |
| 18296069 | DECENTRALIZED SECURE TRUE DIGITAL ID FOR COMMUNICATION | April 2023 | March 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18194706 | REAL-TIME ANALYSIS PLUGIN FOR CYBER DEFENSE | April 2023 | March 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18193538 | UNIFIED IDENTIFICATION VERIFICATION SYSTEM | March 2023 | February 2025 | Allow | 22 | 0 | 0 | Yes | No |
| 17912393 | System and Method of Creating Symmetric Keys Using Elliptic Curve Cryptography | March 2023 | December 2024 | Allow | 27 | 0 | 0 | Yes | No |
| 18026179 | INFORMATION PROCESSING DEVICE, CONTROL METHOD, AND PROGRAM | March 2023 | April 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18179830 | INTRUSION DETECTION USING A HEARTBEAT | March 2023 | January 2024 | Allow | 10 | 1 | 0 | No | No |
| 18177145 | SYSTEMS AND METHODS FOR GENERATING TRUST SCORES AND RELATED RECOMMENDATIONS USING SPDM-ENABLED DEVICES | March 2023 | December 2025 | Allow | 33 | 2 | 0 | Yes | No |
| 18172747 | ELECTRONIC DEVICE AND MEMORY PROTECTION METHOD USING SAME | February 2023 | January 2025 | Allow | 23 | 0 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LAKHIA, VIRAL S.
With a 25.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 57.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner LAKHIA, VIRAL S works in Art Unit 2431 and has examined 599 patent applications in our dataset. With an allowance rate of 89.0%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 29 months.
Examiner LAKHIA, VIRAL S's allowance rate of 89.0% places them in the 70% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by LAKHIA, VIRAL S receive 1.76 office actions before reaching final disposition. This places the examiner in the 38% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by LAKHIA, VIRAL S is 29 months. This places the examiner in the 63% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +20.3% benefit to allowance rate for applications examined by LAKHIA, VIRAL S. This interview benefit is in the 64% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 34.2% of applications are subsequently allowed. This success rate is in the 75% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 34.0% of cases where such amendments are filed. This entry rate is in the 51% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 100.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 72% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 87.5% of appeals filed. This is in the 80% percentile among all examiners. Of these withdrawals, 46.4% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 63.2% are granted (fully or in part). This grant rate is in the 68% percentile among all examiners. Strategic Note: Petitions show above-average success regarding this examiner's actions. Petitionable matters include restriction requirements (MPEP § 1002.02(c)(2)) and various procedural issues.
Examiner's Amendments: This examiner makes examiner's amendments in 0.5% of allowed cases (in the 60% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.