Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18950601 | WEBSOCKET CONNECTIONS SUPPORTING SYSTEM MANAGEMENT COMMUNICATIONS | November 2024 | March 2026 | Allow | 15 | 0 | 0 | No | No |
| 18912673 | ANTIHACKER DIGITAL TAMPER SWITCH TO TRACK CARGO BEING TRANSPORTED | October 2024 | February 2026 | Allow | 16 | 0 | 0 | No | No |
| 18912417 | BLOCKCHAIN-BASED INDUSTRIAL INTERNET OF THINGS DATA MANAGEMENT AND OPTIMIZATION SYSTEM AND METHOD | October 2024 | February 2026 | Allow | 16 | 0 | 0 | No | No |
| 18787747 | BLOCKCHAIN FOLDING | July 2024 | January 2026 | Allow | 17 | 0 | 0 | No | No |
| 18760297 | SYSTEMS, METHODS, AND DEVICES FOR MULTI-STAGE PROVISIONING AND MULTI-TENANT OPERATION FOR A SECURITY CREDENTIAL MANAGEMENT SYSTEM | July 2024 | January 2025 | Allow | 7 | 0 | 0 | No | No |
| 18674271 | STRUCTURE-BASED ACCESS CONTROL | May 2024 | July 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18673015 | CENTRALIZED EVENT DETECTION | May 2024 | August 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18665954 | DISTRIBUTED PRIVACY-PRESERVING COMPUTING ON PROTECTED DATA | May 2024 | July 2025 | Allow | 14 | 1 | 0 | No | No |
| 18655597 | AUTOMATIC RULE GENERATION FOR MALICIOUS INDICATORS BASED ON HISTORICAL DATA | May 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18707796 | Methods and associated computer systems for ensuring the integrity of data | May 2024 | August 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18637170 | SYSTEMS AND METHODS FOR CORRESPONDENCE FRAUD DETECTION | April 2024 | January 2026 | Allow | 21 | 1 | 0 | Yes | No |
| 18629254 | SYSTEM AND METHOD FOR SECURE ACCESS CONTROL | April 2024 | April 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18592137 | ENDPOINT-ASSISTED INSPECTION OF ENCRYPTED NETWORK TRAFFIC | February 2024 | May 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18587346 | AI-Based Vehicle Cybersecurity with 5G/6G Sub-Network Topology | February 2024 | November 2024 | Allow | 9 | 1 | 1 | No | No |
| 18583496 | SYSTEMS AND METHODS FOR MANAGEMENT OF MODELS DATABASE | February 2024 | July 2025 | Allow | 17 | 0 | 0 | No | No |
| 18437206 | Secure Web Gateway Visibility Into Certificate-pinned Applications | February 2024 | December 2025 | Allow | 23 | 1 | 0 | Yes | No |
| 18425252 | VERIFICATION METHOD, SERVER, AND RECORDING MEDIUM | January 2024 | November 2025 | Allow | 22 | 1 | 0 | No | No |
| 18416439 | ENDPOINT-ASSISTED INSPECTION OF ENCRYPTED NETWORK TRAFFIC | January 2024 | March 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18409412 | DEVICE VISIBILITY AND SCANNING INCLUDING NETWORK SEGMENTS | January 2024 | April 2025 | Allow | 15 | 2 | 0 | Yes | No |
| 18401314 | MOBILE APPLICATION AUTHENTICATION INFRASTRUCTURE | December 2023 | March 2025 | Allow | 15 | 2 | 0 | Yes | No |
| 18398434 | ELECTRONIC DEVICE FOR PERFORMING EVALUATION OF ENCRYPTED MESSAGES AND METHODS THEREOF | December 2023 | October 2025 | Allow | 22 | 1 | 0 | No | No |
| 18395745 | SCAN CHAIN SECURITY CIRCUIT AND DRIVING METHOD THEREOF | December 2023 | July 2025 | Allow | 18 | 0 | 0 | No | No |
| 18572088 | COMPUTER-IMPLEMENTED METHOD AND SYSTEM FOR CHECKING DATA ANONYMIZATION | December 2023 | June 2024 | Allow | 6 | 0 | 0 | No | No |
| 18545960 | COMPLEX NETWORK ATTACK DETECTION METHOD BASED ON CROSS-HOST ABNORMAL BEHAVIOR RECOGNITION | December 2023 | April 2024 | Allow | 4 | 1 | 0 | No | No |
| 18543244 | RESOURCE-MONITORING TELEMETRY IN A ZERO-TRUST COMPUTING ENVIRONMENT | December 2023 | September 2025 | Allow | 21 | 1 | 0 | Yes | No |
| 18542848 | VALIDATED TELEMETRY IN A ZERO-TRUST COMPUTING ENVIRONMENT | December 2023 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18541546 | ADAPTABLE TELEMETRY ORCHESTRATION IN ZERO-TRUST COMPUTING ENVIRONMENTS | December 2023 | January 2026 | Allow | 26 | 2 | 0 | Yes | No |
| 18541456 | ADAPTABLE TELEMETRY IN ZERO-TRUST COMPUTING ENVIRONMENTS | December 2023 | February 2026 | Allow | 26 | 1 | 0 | Yes | No |
| 18533397 | VIRTUAL GATEWAY PROXY | December 2023 | March 2026 | Allow | 27 | 1 | 0 | Yes | No |
| 18527258 | SOCIAL MEDIA PROFILE IDENTIFICATION CONNECTED TO CRYPTOGRAPHIC TOKEN | December 2023 | July 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18515410 | ADAPTIVE ARTIFICIAL INTELLIGENCE SYSTEMS AND METHODS FOR TOKEN VERIFICATION | November 2023 | June 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18387633 | METHOD AND SYSTEM FOR ASYNCHRONOUS MEDICAL PATIENT DATA COMMUNICATION AND MANAGEMENT | November 2023 | April 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18495939 | PREVENTING DATA AND HARDWARE LOSS IN PRE-PROVISIONED DEVICES | October 2023 | May 2025 | Allow | 19 | 0 | 0 | No | No |
| 18494462 | BLOCKCHAIN-BASED ADMISSION PROCESSES FOR PROTECTED ENTITIES | October 2023 | September 2024 | Allow | 10 | 1 | 0 | No | No |
| 18486089 | SPONSOR DELEGATION FOR MULTI-FACTOR AUTHENTICATION | October 2023 | March 2025 | Allow | 17 | 2 | 0 | Yes | No |
| 18553704 | POLICIES RELATED TO NON-PUBLIC NETWORKS | October 2023 | December 2025 | Allow | 26 | 1 | 1 | Yes | No |
| 18369214 | CONTENT ENCRYPTION AND IN-PLACE DECRYPTION USING VISUALLY ENCODED CIPHERTEXT | September 2023 | July 2025 | Allow | 22 | 0 | 0 | No | No |
| 18239102 | METHODS AND SYSTEMS FOR CLOUD SECURITY OPERATIONS | August 2023 | December 2025 | Allow | 28 | 1 | 0 | No | No |
| 18278264 | SYSTEMS AND METHODS FOR MANAGING PRIVILEGES IN A DATA PROCESSING SYSTEM | August 2023 | January 2026 | Allow | 29 | 0 | 1 | No | No |
| 18230801 | Systems, Methods and Computer Program Products for Cache Device Based Remote Data Retrieval from Computing Devices | August 2023 | May 2025 | Allow | 21 | 0 | 0 | No | No |
| 18363222 | TRUST SCORING VISUALIZATION IN A ZERO-TRUST COMPUTING ENVIRONMENT | August 2023 | April 2025 | Allow | 20 | 0 | 0 | No | No |
| 18363258 | SYSTEM-METRICS BASED TRUST SCORING IN A ZERO-TRUST COMPUTING ENVIRONMENT | August 2023 | April 2025 | Allow | 20 | 0 | 0 | No | No |
| 18226351 | SYSTEMS, METHODS, AND DEVICES FOR MULTI-STAGE PROVISIONING AND MULTI-TENANT OPERATION FOR A SECURITY CREDENTIAL MANAGEMENT SYSTEM | July 2023 | March 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18356934 | BLOCKCHAIN FOLDING | July 2023 | March 2024 | Allow | 8 | 0 | 0 | No | No |
| 18222915 | METHODS AND SYSTEMS OF PROVIDING VERIFICATION OF INFORMATION USING A CENTRALIZED OR DISTRIBUTED LEDGER | July 2023 | June 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18343361 | GRANTING ACCESS TO RESOURCES OF A DATABASE | June 2023 | April 2024 | Allow | 10 | 1 | 0 | No | No |
| 18214217 | STRUCTURE-BASED ACCESS CONTROL | June 2023 | January 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18335053 | DISTRIBUTED PRIVACY-PRESERVING COMPUTING ON PROTECTED DATA | June 2023 | January 2024 | Allow | 7 | 0 | 0 | No | No |
| 18331211 | COMPOSITE ADVERSARIAL ATTACK MODEL TRAINING FOR NEURAL NETWORKS | June 2023 | February 2026 | Allow | 32 | 0 | 0 | Yes | No |
| 18206399 | SYSTEM AND METHOD FOR DEVICE LABEL SCAN BASED ZERO TOUCH DEVICE ONBOARDING AND DEVICE DIRCTORY SERVICE | June 2023 | August 2023 | Allow | 2 | 0 | 0 | No | No |
| 18038709 | METHOD AND DEVICE FOR IMAGE-BASED MALWARE DETECTION, AND ARTIFICIAL INTELLIGENCE-BASED ENDPOINT DETECTION AND RESPONSE SYSTEM USING SAME | May 2023 | June 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18196712 | USING MULTIMODAL MODEL CONSISTENCY TO DETECT ADVERSARIAL ATTACKS | May 2023 | December 2023 | Allow | 7 | 0 | 0 | No | No |
| 18140626 | CONTENT ENCRYPTION AND IN-PLACE DECRYPTION USING VISUALLY ENCODED CIPHERTEXT | April 2023 | April 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18309259 | SYSTEM AND METHOD FOR GENERATION AND DISTRIBUTION OF SECURITY MODELS | April 2023 | February 2026 | Allow | 34 | 1 | 0 | No | No |
| 18309273 | SYSTEM AND METHOD FOR MANAGING SECURITY MODELS THROUGH SCENARIO GENERATION AND EVALUATION | April 2023 | December 2025 | Allow | 32 | 1 | 0 | No | No |
| 18301501 | USER AUTHENTICATION AND AUTHORIZATION FOR CONTAINERS | April 2023 | February 2025 | Allow | 22 | 0 | 0 | No | No |
| 18194689 | SYSTEMS AND METHODS FOR CREDENTIALING OF NON LOCAL REQUESTORS IN DECOUPLED SYSTEMS UTILIZING A DOMAIN LOCAL AUTHENTICATOR | April 2023 | October 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18190870 | SYSTEMS AND METHODS FOR TOKENIZATION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) | March 2023 | January 2025 | Allow | 21 | 3 | 0 | Yes | No |
| 18044865 | METHOD AND APPARATUS FOR CORRECTING POLARIZATION DISTORTION OF FARADAY ROTATING MIRROR IN PLUG-AND-PLAY QUANTUM KEY DISTRIBUTION SYSTEM | March 2023 | January 2025 | Allow | 22 | 0 | 1 | Yes | No |
| 17907768 | Blockchain method and system, electronic device, and computer-readable storage medium | March 2023 | September 2025 | Allow | 36 | 1 | 1 | Yes | No |
| 18175218 | CORRELATING FIREWALL AND ZERO TRUST DATA TO MONITOR REMOTE AND HYBRID WORKER SESSIONS | February 2023 | November 2025 | Allow | 32 | 2 | 0 | Yes | No |
| 18173831 | SYSTEMS AND METHODS FOR CONTENT-BASED ONLOOKER MITIGATION | February 2023 | April 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18113919 | TECHNIQUES TO PROVIDE USER AUTHENTICATION FOR A NEAR-EYE DISPLAY DEVICE | February 2023 | July 2025 | Abandon | 28 | 1 | 0 | No | No |
| 18173826 | SYSTEMS AND METHODS FOR CONTEXTUAL ACTIVATION OF ONLOOKER DETECTION | February 2023 | September 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 18173823 | SYSTEMS AND METHODS FOR INDICATING ONLOOKER VULNERABILITY | February 2023 | August 2025 | Allow | 30 | 2 | 0 | Yes | No |
| 18042320 | METHOD FOR DATA MANIPULATION DETECTION OF NUMERICAL DATA VALUES | February 2023 | October 2024 | Allow | 20 | 0 | 0 | No | No |
| 18170624 | MASTER DATA MANAGEMENT SYSTEMS USING DISTRIBUTED CRYPTOGRAPHIC BLOCKCHAIN ESTABLISHING TRUST CONTROL | February 2023 | September 2024 | Allow | 19 | 0 | 1 | Yes | No |
| 18168607 | SYSTEMS AND METHODS FOR CAPTURING, RECORDING, STORING, AND TRANSMITTING IMAGES IN RESPONSE TO ONLOOKER DETECTION EVENTS IN HETEROGENEOUS COMPUTING PLATFORMS | February 2023 | May 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 17622965 | SECURITY-BY-DESIGN METHODOLOGY USING EVIDENCE-BASED SECURITY APPROACH | February 2023 | March 2026 | Allow | 50 | 3 | 0 | No | No |
| 18165373 | SYSTEMS AND METHODS FOR MANAGING ONLOOKER DETECTION IN HETEROGENEOUS COMPUTING PLATFORMS | February 2023 | October 2025 | Allow | 32 | 2 | 0 | Yes | No |
| 18104939 | SYSTEM AND METHOD FOR SECURE ACCESS CONTROL | February 2023 | December 2023 | Allow | 10 | 1 | 0 | No | No |
| 18102450 | METHOD AND SYSTEM FOR ASYNCHRONOUS MEDICAL PATIENT DATA COMMUNICATION BETWEEN MULTIPLE PARTIES | January 2023 | January 2024 | Allow | 12 | 2 | 0 | Yes | No |
| 18096882 | CENTRALIZED EVENT DETECTION | January 2023 | January 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18089549 | SELF-ENCRYPTING KEY MANAGEMENT SYSTEM | December 2022 | November 2024 | Allow | 23 | 3 | 0 | Yes | No |
| 18083324 | SHIM BASED SECURE MODULE ACCESS | December 2022 | October 2024 | Allow | 22 | 0 | 0 | No | No |
| 18066570 | SOCIAL MEDIA PROFILE IDENTIFICATION CONNECTED TO CRYPTOGRAPHIC TOKEN | December 2022 | August 2023 | Allow | 8 | 0 | 0 | Yes | No |
| 18066100 | ADAPTIVE ARTIFICIAL INTELLIGENCE SYSTEMS AND METHODS FOR TOKEN VERIFICATION | December 2022 | July 2023 | Allow | 7 | 0 | 0 | No | No |
| 18073979 | METHOD AND SYSTEM FOR ASYNCHRONOUS MEDICAL PATIENT DATA COMMUNICATION AND MANAGEMENT | December 2022 | January 2024 | Allow | 13 | 2 | 0 | Yes | No |
| 17988664 | DISTRIBUTED PRIVACY-PRESERVING COMPUTING ON PROTECTED DATA | November 2022 | March 2023 | Allow | 4 | 0 | 0 | No | No |
| 17976663 | Cryptographic Mediation of Communication Channels for Software Applications | October 2022 | October 2025 | Allow | 35 | 1 | 0 | Yes | No |
| 17962769 | STRUCTURE-BASED ACCESS CONTROL | October 2022 | March 2023 | Allow | 5 | 0 | 0 | No | No |
| 17958154 | SECURITY AND GOVERNANCE POLICIES IN ELECTRONIC SIGNATURE SYSTEMS | September 2022 | March 2025 | Allow | 30 | 0 | 0 | Yes | No |
| 17937441 | DELEGATED FINE-GRAINED ACCESS CONTROL FOR DATA LAKES | September 2022 | February 2025 | Allow | 28 | 0 | 0 | No | No |
| 17945189 | UTILIZING A CONTINGENT ACTION TOKEN | September 2022 | October 2024 | Allow | 25 | 0 | 0 | Yes | No |
| 17942054 | METHOD AND SYSTEM FOR ASYNCHRONOUS MEDICAL PATIENT DATA COMMUNICATION AND MANAGEMENT | September 2022 | August 2023 | Allow | 11 | 1 | 0 | No | No |
| 17887037 | DETECTION OF PHISHING WEBSITES USING MACHINE LEARNING | August 2022 | July 2025 | Allow | 35 | 2 | 0 | Yes | No |
| 17816226 | BLOCKCHAIN-BASED ADMISSION PROCESSES FOR PROTECTED ENTITIES | July 2022 | July 2023 | Allow | 12 | 0 | 0 | No | No |
| 17812692 | SOCIAL MEDIA PROFILE IDENTIFICATION CONNECTED TO CRYPTOGRAPHIC TOKEN | July 2022 | September 2022 | Allow | 2 | 0 | 0 | No | No |
| 17812701 | SOCIAL MEDIA PROFILE IDENTIFICATION CONNECTED TO CRYPTOGRAPHIC TOKEN | July 2022 | February 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 17848587 | SECURE OVER-THE-AIR FIRMWARE UPGRADE | June 2022 | June 2024 | Allow | 24 | 0 | 1 | Yes | No |
| 17847356 | SECURING METRICS FOR A POD | June 2022 | February 2025 | Allow | 32 | 1 | 0 | Yes | No |
| 17749886 | METHODS AND SYSTEMS FOR DISTRIBUTED CRYPTOGRAPHICALLY SECURED DATA VALIDATION | May 2022 | June 2023 | Allow | 13 | 0 | 0 | No | No |
| 17734123 | FLOW-BASED SECURE PACKET FORWARDING | May 2022 | June 2025 | Allow | 37 | 2 | 0 | No | No |
| 17722131 | ENDPOINT-ASSISTED INSPECTION OF ENCRYPTED NETWORK TRAFFIC | April 2022 | October 2023 | Allow | 18 | 2 | 0 | Yes | No |
| 17720821 | AUTHENTICATION SYSTEM | April 2022 | September 2025 | Allow | 41 | 4 | 0 | No | No |
| 17715055 | CONTENT ENCRYPTION AND IN-PLACE DECRYPTION USING VISUALLY ENCODED CIPHERTEXT | April 2022 | January 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 17710056 | DATA SHARING USING ALIAS OBJECTS | March 2022 | May 2023 | Allow | 13 | 3 | 0 | Yes | No |
| 17704771 | TAGLESS IMPLICIT INTEGRITY WITH MULTI-PERSPECTIVE PATTERN SEARCH | March 2022 | April 2024 | Allow | 24 | 0 | 0 | No | No |
| 17697744 | DATA SHARING USING ALIAS OBJECTS | March 2022 | June 2023 | Allow | 15 | 1 | 0 | Yes | No |
| 17696009 | AUTHENTICATING A DEVICE IN A COMMUNICATION NETWORK OF AN AUTOMATION INSTALLATION | March 2022 | July 2024 | Allow | 28 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner VAUGHAN, MICHAEL R.
With a 31.6% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 34.5% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner VAUGHAN, MICHAEL R works in Art Unit 2431 and has examined 855 patent applications in our dataset. With an allowance rate of 80.6%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 31 months.
Examiner VAUGHAN, MICHAEL R's allowance rate of 80.6% places them in the 51% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by VAUGHAN, MICHAEL R receive 2.04 office actions before reaching final disposition. This places the examiner in the 53% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by VAUGHAN, MICHAEL R is 31 months. This places the examiner in the 55% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +29.8% benefit to allowance rate for applications examined by VAUGHAN, MICHAEL R. This interview benefit is in the 78% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 28.4% of applications are subsequently allowed. This success rate is in the 52% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 23.3% of cases where such amendments are filed. This entry rate is in the 31% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 29.6% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 31% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 66.7% of appeals filed. This is in the 49% percentile among all examiners. Of these withdrawals, 31.6% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 30.1% are granted (fully or in part). This grant rate is in the 17% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 3.6% of allowed cases (in the 82% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.9% of allowed cases (in the 59% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.