Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18907977 | METHODS FOR VERIFYING DATABASE QUERY RESULTS AND DEVICES THEREOF | October 2024 | December 2024 | Allow | 2 | 1 | 0 | Yes | No |
| 18387414 | SECURE DIGITAL ASSET LEASING SYSTEM | November 2023 | February 2025 | Abandon | 16 | 3 | 0 | Yes | No |
| 18208702 | AUTHENTICATION SYSTEM FOR PROVIDING BIOMETRICS-BASED LOGIN SERVICE | June 2023 | June 2025 | Abandon | 25 | 1 | 0 | No | No |
| 18133892 | SYSTEM AND METHODS FOR AUTHENTICATING TANGIBLE PRODUCTS | April 2023 | January 2024 | Allow | 9 | 1 | 1 | Yes | No |
| 17992022 | Identity And Access Management Using A Decentralized Gateway Computing System | November 2022 | May 2025 | Allow | 30 | 2 | 0 | Yes | No |
| 17938381 | DETECTION OF A REWIND ATTACK AGAINST A SECURE ENCLAVE | October 2022 | April 2024 | Abandon | 19 | 1 | 0 | No | No |
| 17932833 | SERIALIZATION OF FIREWALL RULES WITH USER, DEVICE, AND APPLICATION CORRELATION | September 2022 | February 2025 | Abandon | 29 | 2 | 0 | Yes | No |
| 17940802 | SECURE CONNECTIONS ESTABLISHMENT | September 2022 | October 2024 | Abandon | 25 | 2 | 0 | No | No |
| 17844218 | SYSTEM AND METHODS FOR AUTHENTICATING TANGIBLE PRODUCTS | June 2022 | April 2025 | Abandon | 34 | 1 | 0 | No | No |
| 17734936 | SYSTEM AND METHOD FOR FILE AND FILE SYSTEM INTEGRITY USING DIRECTORIES | May 2022 | January 2025 | Abandon | 32 | 1 | 0 | No | No |
| 17734942 | SYSTEM AND METHOD FOR VERIFYING A SECURED FILE, DIRECTORY OR META-DATA | May 2022 | February 2025 | Abandon | 33 | 1 | 0 | No | No |
| 17717210 | METHOD AND SYSTEM FOR PROVIDING LIMITED DISTRIBUTION OF A DIGITAL MEDIA FILE | April 2022 | May 2025 | Abandon | 38 | 2 | 0 | No | No |
| 17563535 | Methods, Systems, and Computer Readable Media for Adaptive Packet Filtering | December 2021 | October 2024 | Abandon | 33 | 2 | 0 | No | No |
| 17450982 | PROTECTION DEVICE AND DONGLE AND METHOD FOR USING THE SAME | October 2021 | July 2024 | Abandon | 33 | 1 | 0 | No | No |
| 17490711 | COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR APPLICATION IDENTIFICATION AND AUTHENTICATION | September 2021 | June 2024 | Abandon | 33 | 6 | 0 | No | No |
| 17490288 | COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR APPLICATION IDENTIFICATION AND AUTHENTICATION | September 2021 | June 2024 | Abandon | 33 | 4 | 0 | Yes | Yes |
| 17393314 | AUTHENTICATION SYSTEM FOR PROVIDING BIOMETRICS-BASED LOGIN SERVICE | August 2021 | November 2023 | Abandon | 27 | 2 | 1 | Yes | No |
| 17362913 | BLOCKCHAIN DATA PROCESSING METHODS AND APPARATUSES BASED ON CLOUD COMPUTING | June 2021 | July 2022 | Allow | 13 | 3 | 0 | Yes | No |
| 17341166 | LOGIN TO A SUSPENDED ACCOUNT | June 2021 | August 2022 | Abandon | 15 | 2 | 0 | Yes | No |
| 17283156 | SYSTEM AND METHODS FOR AUTHENTICATING TANGIBLE PRODUCTS | April 2021 | March 2022 | Allow | 11 | 2 | 0 | Yes | No |
| 17187425 | TIME-BASED DEGRADATION OF DIGITAL CREDENTIALS IN A DIGITAL CREDENTIAL PLATFORM | February 2021 | October 2024 | Abandon | 43 | 2 | 0 | No | No |
| 17155089 | AUTOMATED AUTHENTICATION AND AUTHORIZATION IN A COMMUNICATION SYSTEM | January 2021 | March 2023 | Allow | 26 | 4 | 1 | Yes | No |
| 17133276 | METHOD FOR MANAGING NETWORK DEVICES, APPARATUS, AND COMPUTER READABLE STORAGE MEDIUM | December 2020 | February 2024 | Abandon | 38 | 0 | 1 | No | No |
| 17130180 | DETECTING SUSPICIOUS ACTIVATION OF AN APPLICATION IN A COMPUTER DEVICE | December 2020 | April 2025 | Allow | 52 | 5 | 1 | Yes | No |
| 17255087 | Methods for Delivering an Authenticatable Management Activity to Remote Devices | December 2020 | March 2023 | Abandon | 26 | 1 | 0 | No | No |
| 17121867 | MICRO-SEGMENTATION OF VIRTUAL COMPUTING ELEMENTS | December 2020 | March 2023 | Allow | 27 | 2 | 0 | Yes | Yes |
| 17107584 | MANAGING COMMUNICATIONS AMONG CONSENSUS NODES AND CLIENT NODES | November 2020 | April 2021 | Allow | 5 | 1 | 0 | Yes | No |
| 17052038 | PRIVACY CONTROLS FOR NETWORK DATA COMMUNICATIONS | October 2020 | January 2024 | Abandon | 39 | 1 | 0 | No | No |
| 17065212 | DOUBLY LINKED BLOCKCHAIN | October 2020 | April 2024 | Allow | 42 | 3 | 0 | Yes | No |
| 16948925 | TRUSTED EXECUTION ENVIRONMENT (TEE) DETECTION OF SYSTEMIC MALWARE IN A COMPUTING SYSTEM THAT HOSTS THE TEE | October 2020 | November 2023 | Abandon | 37 | 3 | 0 | No | No |
| 17044299 | METHOD AND SYSTEM FOR HANDWRITTEN SIGNATURE VERIFICATION | September 2020 | October 2023 | Allow | 37 | 0 | 0 | No | No |
| 17037105 | DYNAMIC OPTIMIZATION OF CLIENT APPLICATION ACCESS VIA A SECURE ACCESS SERVICE EDGE (SASE) NETWORK OPTIMIZATION CONTROLLER (NOC) | September 2020 | June 2024 | Abandon | 45 | 3 | 0 | Yes | No |
| 17032780 | SECURE AUTHENTICATION METHOD FOR PERFORMING A HOST OPERATION USING A DELEGATED AUTHORIZATION MECHANISM | September 2020 | March 2025 | Abandon | 54 | 4 | 0 | Yes | No |
| 17032592 | PROTECTING SENSITIVE DATA IN DOCUMENTS | September 2020 | June 2025 | Allow | 57 | 4 | 0 | Yes | No |
| 16942023 | Determining Authenticity of Reported User Action in Cybersecurity Risk Assessment | July 2020 | April 2024 | Allow | 45 | 2 | 0 | Yes | No |
| 16919998 | DEVICE-SPECIFIC AUTHENTICATION CREDENTIALS | July 2020 | January 2023 | Abandon | 31 | 2 | 0 | No | No |
| 16914148 | PERSONAL INFORMATION VAULT | June 2020 | December 2024 | Abandon | 54 | 4 | 0 | Yes | No |
| 16908150 | SYSTEM FOR ISOLATED ACCESS AND ANALYSIS OF SUSPICIOUS CODE IN A DISPOSABLE COMPUTING ENVIRONMENT USING A USER INTERFACE AND AN AUTOMATED INTELLIGENT SYSTEM | June 2020 | September 2023 | Abandon | 39 | 3 | 0 | No | No |
| 16768820 | COMMUNICATION DEVICE, DATA STRUCTURE, COMMUNICATION METHOD, AND COMPUTER PROGRAM | June 2020 | October 2022 | Abandon | 29 | 1 | 0 | No | No |
| 16874189 | APPARATUSES AND METHODS FOR IMPROVED DATA PRIVACY | May 2020 | October 2024 | Abandon | 53 | 4 | 0 | Yes | No |
| 16847749 | DETECTION OF A REWIND ATTACK AGAINST A SECURE ENCLAVE | April 2020 | January 2024 | Abandon | 45 | 1 | 1 | Yes | No |
| 16832437 | Parameter Protection Method And Device, And System | March 2020 | June 2025 | Abandon | 60 | 6 | 0 | Yes | No |
| 16828216 | SYSTEMS AND METHODS FOR EFFICIENT COMPUTATIONS ON SPLIT DATA AND SPLIT ALGORITHMS | March 2020 | February 2024 | Allow | 47 | 8 | 0 | No | No |
| 16803407 | DECENTRALIZED AUTHENTICATION ANCHORED BY DECENTRALIZED IDENTIFIERS | February 2020 | September 2023 | Abandon | 43 | 3 | 0 | Yes | No |
| 16793461 | SYSTEM AND METHOD FOR IDENTIFYING SYSTEM FILES TO BE CHECKED FOR MALWARE USING A REMOTE SERVICE | February 2020 | November 2023 | Abandon | 44 | 6 | 0 | No | No |
| 16716595 | SYSTEMS AND METHODS FOR CONTINUOUS USER AUTHENTICATION | December 2019 | December 2022 | Allow | 36 | 2 | 0 | No | No |
| 16680873 | GENERATING HIGHLY REALISTIC DECOY EMAIL AND DOCUMENTS | November 2019 | November 2020 | Abandon | 12 | 1 | 0 | No | No |
| 16612115 | METHOD FOR HANDWRITTEN ELECTRONIC SIGNATURE | November 2019 | December 2020 | Abandon | 14 | 1 | 0 | No | No |
| 16673121 | ENDPOINT SECURITY ARCHITECTURE WITH PROGRAMMABLE LOGIC ENGINE | November 2019 | January 2023 | Abandon | 38 | 2 | 0 | No | Yes |
| 16579310 | CENTRALIZED CAPABILITY SYSTEM FOR PROGRAMMABLE SWITCHES | September 2019 | March 2025 | Abandon | 60 | 6 | 0 | Yes | Yes |
| 16570365 | SERIALIZATION OF FIREWALL RULES WITH USER, DEVICE, AND APPLICATION CORRELATION | September 2019 | June 2022 | Allow | 33 | 1 | 0 | Yes | No |
| 16567781 | NETWORK AUTHENTICATION FOR REAL-TIME INTERACTION USING PRE-AUTHORIZED DATA RECORD | September 2019 | January 2022 | Abandon | 28 | 3 | 0 | No | No |
| 16544694 | SYSTEM AND METHOD FOR AUTOMATIC DIGITAL COPY FOR PHYSICAL MEDIA PURCHASE | August 2019 | August 2024 | Allow | 60 | 4 | 0 | Yes | Yes |
| 16486445 | METHOD AND SYSTEM FOR PROVIDING LIMITED DISTRIBUTION OF A DIGITAL MEDIA FILE | August 2019 | March 2022 | Allow | 31 | 3 | 0 | Yes | No |
| 16524387 | Using Assured Calling Sequences in Micro-Sandboxes | July 2019 | February 2021 | Abandon | 19 | 3 | 0 | No | No |
| 16479611 | REQUEST CONTROL DEVICE, REQUEST CONTROL METHOD, AND REQUEST CONTROL PROGRAM | July 2019 | February 2023 | Allow | 42 | 3 | 0 | Yes | No |
| 16517290 | SYSTEMS AND METHODS FOR USING AUTOMATED BROWSING TO RECOVER SECURED KEY FROM A SINGLE DATA ENTRY | July 2019 | April 2021 | Abandon | 21 | 2 | 0 | Yes | No |
| 16515800 | COMMUNICATING CONTENT OVER A COMMUNICATIONS NETWORK | July 2019 | December 2021 | Abandon | 29 | 1 | 0 | No | No |
| 16434585 | AERONAUTICAL CYBERSECURITY | June 2019 | March 2024 | Abandon | 57 | 4 | 0 | Yes | No |
| 16419017 | Securing Authentication Processes | May 2019 | November 2024 | Abandon | 60 | 2 | 1 | Yes | Yes |
| 16417698 | BLOCKCHAIN-ANCHORED SMART DOCUMENTS | May 2019 | July 2020 | Abandon | 14 | 1 | 1 | Yes | No |
| 16415360 | METHOD AND SYSTEM FOR ACCESS TOKEN PROCESSING | May 2019 | April 2024 | Allow | 59 | 4 | 1 | Yes | No |
| 16411588 | METHOD AND SYSTEM FOR VERIFICATION OF DELETED DATA FOR BLOCKCHAINS | May 2019 | November 2024 | Abandon | 60 | 10 | 0 | Yes | Yes |
| 16410866 | DATA PROCESSING SYSTEMS FOR FULFILLING DATA SUBJECT ACCESS REQUESTS AND RELATED METHODS | May 2019 | April 2021 | Abandon | 23 | 2 | 1 | No | No |
| 16403574 | CLIENT-SITE DOM API ACCESS CONTROL | May 2019 | June 2023 | Abandon | 49 | 6 | 0 | Yes | Yes |
| 16401223 | HARDWARE INTRUSION DETECTION SYSTEM | May 2019 | October 2021 | Allow | 30 | 1 | 0 | Yes | No |
| 16398194 | System, Method and Apparatus for Increasing Website Relevance While Protecting Privacy | April 2019 | April 2021 | Allow | 24 | 0 | 0 | No | No |
| 16390464 | MANAGING COMMUNICATIONS AMONG CONSENSUS NODES AND CLIENT NODES | April 2019 | August 2020 | Allow | 16 | 3 | 0 | Yes | No |
| 16377463 | Adjusting Biometric Detection Thresholds Based on Recorded Behavior | April 2019 | November 2023 | Allow | 55 | 3 | 1 | Yes | No |
| 16356987 | SYSTEM AND METHOD FOR PRE-AUTHENTICATION OF CUSTOMER SUPPORT CALLS | March 2019 | March 2021 | Allow | 24 | 3 | 0 | Yes | No |
| 16266467 | DETERMINING AUTHENTICITY OF REPORTED USER ACTION IN CYBERSECURITY RISK ASSESSMENT | February 2019 | April 2020 | Allow | 15 | 2 | 0 | Yes | No |
| 16172667 | Universal Authentication and Data Exchange Method, System and Service | October 2018 | December 2020 | Abandon | 25 | 2 | 0 | Yes | No |
| 16165877 | GENERATION AND MAINTENANCE OF IDENTITY PROFILES FOR IMPLEMENTATION OF SECURITY RESPONSE | October 2018 | March 2025 | Abandon | 60 | 6 | 1 | No | No |
| 16162099 | IMPERSONATION FOR A FEDERATED USER | October 2018 | August 2022 | Allow | 46 | 2 | 0 | Yes | No |
| 16157782 | Gesture Based Authentication for Payment in Virtual Reality | October 2018 | October 2022 | Abandon | 48 | 4 | 0 | No | Yes |
| 16152132 | TECHNIQUES FOR CREDENTIAL GENERATION | October 2018 | September 2024 | Abandon | 60 | 7 | 0 | No | Yes |
| 16149236 | TRUSTED ACCOUNT REVOCATION IN FEDERATED IDENTITY MANAGEMENT | October 2018 | May 2022 | Allow | 43 | 4 | 0 | Yes | No |
| 16129409 | SYSTEM AND METHODOLOGY FOR SELECTIVE APPLICATION PERMISSIONING | September 2018 | June 2021 | Abandon | 33 | 5 | 0 | Yes | No |
| 16112083 | CONTROLLING CONTENT AND CONTENT SOURCES ACCORDING TO SITUATIONAL CONTEXT | August 2018 | January 2022 | Abandon | 41 | 4 | 0 | No | No |
| 16066315 | DARK WEB MONITORING, ANALYSIS AND ALERT SYSTEM AND METHOD | June 2018 | September 2022 | Allow | 51 | 4 | 0 | Yes | No |
| 16019575 | METHODS AND APPARATUS TO ASSIGN SECURITY IN NETWORKED COMPUTING ENVIRONMENTS | June 2018 | December 2024 | Abandon | 60 | 5 | 0 | Yes | No |
| 16063556 | METHOD FOR AUTHENTICATION VIA A COMBINATION OF BIOMETRIC PARAMETERS | June 2018 | September 2020 | Abandon | 27 | 1 | 0 | No | No |
| 16063265 | DEVICE FOR SELF-DEFENSE SECURITY BASED ON SYSTEM ENVIRONMENT AND USER BEHAVIOR ANALYSIS, AND OPERATING METHOD THEREFOR | June 2018 | June 2022 | Abandon | 48 | 5 | 0 | No | No |
| 15993553 | TIME-BASED DEGRADATION OF DIGITAL CREDENTIALS IN A DIGITAL CREDENTIAL PLATFORM | May 2018 | May 2024 | Abandon | 60 | 3 | 0 | No | No |
| 15985605 | PROXY MANAGER USING REPLICA AUTHENTICATION INFORMATION | May 2018 | March 2025 | Abandon | 60 | 5 | 0 | Yes | No |
| 15963760 | Automated Security Risk Assessment Systems and Methods | April 2018 | April 2022 | Allow | 48 | 5 | 0 | No | No |
| 15952095 | NETWORK AUTHENTICATION FOR REAL-TIME INTERACTION USING PRE-AUTHORIZED DATA RECORD | April 2018 | December 2021 | Abandon | 44 | 4 | 0 | No | No |
| 15937831 | MULTIPLEXING SECURITY TUNNELS | March 2018 | May 2022 | Abandon | 50 | 4 | 0 | Yes | No |
| 15928705 | COMPUTER IMPLEMENTED METHOD FOR AUTOMATICALLY CERTIFYING DOCUMENTS WITH INTEGRITY AND AUTHENTICITY GUARANTEES AND COMPUTER PROGRAMS THEREOF | March 2018 | May 2021 | Allow | 38 | 3 | 0 | Yes | No |
| 15913329 | SYSTEM AND METHOD FOR AIRCRAFT DATA LOADING USING CABIN GATEWAYS | March 2018 | June 2023 | Abandon | 60 | 2 | 0 | No | Yes |
| 15881377 | ASSEMBLY AND METHOD FOR ACCESSING SECURE NETWORKS USING OPTICALLY-SENSED INFORMATION | January 2018 | March 2022 | Abandon | 50 | 2 | 0 | No | No |
| 15853199 | SYSTEMS AND METHODS IMPLEMENTING COUNTERMEASURES TO PHASE TRACKING ATTACKS ON RING OSCILLATOR BASED ENTROPY SOURCES | December 2017 | January 2023 | Allow | 60 | 4 | 0 | Yes | Yes |
| 15851986 | METHOD FOR THE SECURITY OF AN ELECTRONIC OPERATION WITH A CHIP CARD | December 2017 | August 2021 | Allow | 44 | 3 | 0 | Yes | No |
| 15852793 | SERVER, CAMERA AND METHOD | December 2017 | December 2020 | Abandon | 36 | 2 | 0 | No | No |
| 15851648 | DATA NETWORK PATH INTEGRITY VERIFICATION | December 2017 | March 2022 | Abandon | 51 | 3 | 0 | Yes | No |
| 15849889 | METHOD FOR ACCELERATING EXECUTION OF APPLICATION IN A TRUSTED EXECUTION ENVIRONMENT | December 2017 | May 2022 | Allow | 53 | 3 | 0 | Yes | No |
| 15850901 | Cyber Threat Intelligence System Infrastructure | December 2017 | September 2023 | Allow | 60 | 8 | 0 | No | No |
| 15850502 | ELASTIC TIMESTAMPING | December 2017 | March 2021 | Abandon | 39 | 2 | 0 | No | No |
| 15847373 | SECURE VEHICLE CONTROL UNIT UPDATE | December 2017 | July 2021 | Allow | 43 | 3 | 0 | Yes | No |
| 15846911 | TENANT MANAGEMENT METHOD AND SYSTEM IN A CLOUD COMPUTING ENVIRONMENT | December 2017 | October 2022 | Abandon | 58 | 4 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner POPHAM, JEFFREY D.
With a 23.3% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 21.4% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner POPHAM, JEFFREY D works in Art Unit 2432 and has examined 168 patent applications in our dataset. With an allowance rate of 35.1%, this examiner allows applications at a lower rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 45 months.
Examiner POPHAM, JEFFREY D's allowance rate of 35.1% places them in the 3% percentile among all USPTO examiners. This examiner is less likely to allow applications than most examiners at the USPTO.
On average, applications examined by POPHAM, JEFFREY D receive 3.85 office actions before reaching final disposition. This places the examiner in the 100% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by POPHAM, JEFFREY D is 45 months. This places the examiner in the 2% percentile for prosecution speed. Applications take longer to reach final disposition with this examiner compared to most others.
Conducting an examiner interview provides a +26.7% benefit to allowance rate for applications examined by POPHAM, JEFFREY D. This interview benefit is in the 77% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 9.6% of applications are subsequently allowed. This success rate is in the 2% percentile among all examiners. Strategic Insight: RCEs show lower effectiveness with this examiner compared to others. Consider whether a continuation application might be more strategic, especially if you need to add new matter or significantly broaden claims.
This examiner enters after-final amendments leading to allowance in 4.3% of cases where such amendments are filed. This entry rate is in the 2% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 57.1% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 46% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 36.2% of appeals filed. This is in the 3% percentile among all examiners. Of these withdrawals, 23.5% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.
When applicants file petitions regarding this examiner's actions, 47.6% are granted (fully or in part). This grant rate is in the 55% percentile among all examiners. Strategic Note: Petitions show above-average success regarding this examiner's actions. Petitionable matters include restriction requirements (MPEP § 1002.02(c)(2)) and various procedural issues.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 12% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 3.4% of allowed cases (in the 73% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.