Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18885585 | DYNAMIC ENFORCEMENT OF MANAGEMENT RULES ASSOCIATED WITH ARTIFICIAL INTELLIGENCE PIPELINE OBJECT SELECTIONS | September 2024 | December 2024 | Allow | 3 | 0 | 0 | No | No |
| 18795244 | Detecting Security Vulnerabilities Associated with Transient Radio Frequency Devices | August 2024 | January 2025 | Allow | 6 | 1 | 0 | No | No |
| 18793122 | SYSTEMS AND METHODS FOR GENERATING ACCOUNT PERMISSIONS BASED ON APPLICATION PROGRAMMING INTERFACE INTERACTIONS | August 2024 | May 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 18760945 | METHOD AND SYSTEM OF PROVIDING ACCESS TO DOCUMENTS STORED IN PERSONAL STORAGE MEDIUMS | July 2024 | February 2025 | Allow | 7 | 0 | 0 | Yes | No |
| 18743399 | ITEM TRACKING WITH A WIRELESS COMMUNICATION SYSTEM BASED ON A FIFTH GENERATION IDENTIFIER (5GID) AND A GLOBAL TRACKING ITEM NUMBER (GTIN) | June 2024 | June 2025 | Allow | 12 | 0 | 0 | Yes | No |
| 18670285 | RADIO ACCESS NODES AND TERMINAL DEVICES IN A COMMUNICATION NETWORK | May 2024 | September 2024 | Allow | 4 | 0 | 0 | No | No |
| 18645395 | Context-Based Risk Assessment for an Identity Verification System | April 2024 | February 2025 | Allow | 9 | 0 | 0 | Yes | No |
| 18624818 | SYSTEMS AND METHODS FOR PROVIDING SECURITY SERVICES DURING POWER MANAGEMENT MODE | April 2024 | January 2025 | Allow | 10 | 0 | 0 | Yes | No |
| 18601747 | QUANTUM KEY DISTRIBUTION FOR SECURE AND PRIVATE TRANSACTIONS | March 2024 | February 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18435536 | SYSTEMS AND METHODS TO MAINTAIN USER PRIVACY WHILE PROVIDING RECOMMENDATIONS | February 2024 | February 2025 | Allow | 12 | 1 | 0 | Yes | No |
| 18412806 | DETECTION OF VIDEO TAMPERING | January 2024 | December 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18393259 | ATTACK DETECTION IN ROUND-TRIP TIMING ESTIMATION | December 2023 | June 2025 | Allow | 18 | 0 | 0 | No | No |
| 18515939 | POST-COMPLETION ACTION MANAGEMENT IN ONLINE DOCUMENT SYSTEM | November 2023 | November 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18512381 | COMPUTER SYSTEM AND DEVICE FOR CONTROLLING USE OF SECURE MEDIA RECORDINGS | November 2023 | December 2024 | Allow | 13 | 1 | 0 | No | No |
| 18379699 | SELECTIVE MALWARE SCANNING OF FILES ON VIRTUALIZED SNAPSHOTS | October 2023 | May 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18376331 | SYSTEMS AND METHODS FOR PROVIDING SECURITY SERVICES DURING POWER MANAGEMENT MODE | October 2023 | November 2023 | Allow | 1 | 0 | 0 | Yes | No |
| 18368734 | WATERMARKING METHOD FOR SMART CONTRACT | September 2023 | April 2025 | Allow | 19 | 0 | 0 | No | No |
| 18458020 | Prioritized Virus Scanning of Files Based on File Size | August 2023 | April 2025 | Allow | 19 | 0 | 0 | No | No |
| 18454959 | SYSTEMS AND METHODS FOR RAPIDLY GENERATING SECURITY RATINGS | August 2023 | February 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18356004 | BLOCKCHAIN-BASED SYSTEM AND METHOD FOR PREVENTING UNAUTHORIZED DELETION OF SURVEILLANCE VIDEO | July 2023 | April 2025 | Allow | 20 | 0 | 0 | No | No |
| 18343249 | SYSTEMS AND METHODS FOR GENERATING ACCOUNT PERMISSIONS BASED ON APPLICATION PROGRAMMING INTERFACE INTERACTIONS | June 2023 | April 2024 | Allow | 10 | 1 | 0 | No | No |
| 18336861 | AUGMENTED DATA FOR SECURITY DURING RECORD UPDATES | June 2023 | April 2025 | Allow | 22 | 0 | 0 | No | No |
| 18335470 | ARTIFICIAL INTELLIGENCE (AI) MODEL TRAINED USING CLUSTERING AND REINFORCEMENT LEARNING FOR DATA DE-IDENTIFICATION ENGINE | June 2023 | April 2025 | Allow | 22 | 0 | 0 | No | No |
| 18200689 | Malware Detection Using Document Object Model Inspection | May 2023 | April 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18200548 | RADIO FREQUENCY THREAT DETECTION | May 2023 | June 2024 | Allow | 13 | 1 | 0 | No | No |
| 18138115 | Detection of User Interface Imitation | April 2023 | June 2025 | Allow | 26 | 0 | 0 | Yes | No |
| 18193438 | Systems And Methods For Protecting Against Relay Attacks | March 2023 | November 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18125463 | CONSENT-DRIVEN PRIVACY DISCLOSURE CONTROL PROCESSING | March 2023 | March 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18163108 | METHODS AND APPARATUS FOR SECURE CONFIGURATION OF A COMPUTE DEVICE | February 2023 | October 2024 | Allow | 21 | 0 | 0 | No | No |
| 18102530 | Methods and Systems for Determining the Authenticity of a Component | January 2023 | June 2025 | Allow | 29 | 0 | 0 | Yes | No |
| 18006876 | DATA MANAGEMENT COMPUTER, DATA MANAGEMENT SYSTEM INCLUDING THE DATA MANAGEMENT COMPUTER, AND METHOD THEREOF | January 2023 | May 2025 | Allow | 28 | 0 | 0 | No | No |
| 18158594 | SYSTEMS AND METHODS FOR RAPIDLY GENERATING SECURITY RATINGS | January 2023 | June 2023 | Allow | 4 | 0 | 0 | Yes | No |
| 18150354 | SYSTEMS AND METHODS FOR SERVICE AUTHORIZATION IN A DELEGATED DISCOVERY DEPLOYMENT | January 2023 | January 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18063821 | WIRELESS AUDIO DISTRIBUTION SYSTEMS AND METHODS | December 2022 | April 2025 | Allow | 28 | 0 | 0 | No | No |
| 17990102 | CYBERSECURITY SYSTEM FOR EDGE PROTECTION OF A WIRELESS TELECOMMUNICATIONS NETWORK | November 2022 | June 2023 | Allow | 7 | 0 | 0 | No | No |
| 17988209 | RADIO ACCESS NODES AND TERMINAL DEVICES IN A COMMUNICATION NETWORK | November 2022 | February 2024 | Allow | 15 | 2 | 0 | Yes | No |
| 17978274 | PRIVATE CLOUD INFRASTRUCTURE STITCHING PROCESS AND ORCHESTRATION | November 2022 | December 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17978806 | COMPUTER SYSTEM AND DEVICE FOR CONTROLLING USE OF SECURE MEDIA RECORDINGS | November 2022 | July 2023 | Allow | 8 | 0 | 0 | No | No |
| 17977147 | WEB APPLICATION FIREWALL CENTRALIZED MANAGEMENT | October 2022 | February 2025 | Allow | 27 | 0 | 0 | No | No |
| 17922280 | SYSTEMS, METHODS, AND APPARATUS FOR WORKLOAD OPTIMIZED CENTRAL PROCESSING UNITS (CPUS) | October 2022 | February 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 17976009 | EXCHANGE ENGINE FOR SECURE ACCESS SERVICE EDGE (SASE) PROVIDER ROAMING | October 2022 | January 2025 | Allow | 27 | 0 | 0 | No | No |
| 18050250 | Alerting on Anomalous Authorization Requests Derived with Proximity Graph | October 2022 | August 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17968111 | VULNERABILITY ANALYSIS FOR SOFTWARE PRODUCTS | October 2022 | January 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 17967669 | COMPUTER SYSTEM AND DEVICE FOR CONTROLLING USE OF SECURE MEDIA RECORDINGS | October 2022 | August 2023 | Allow | 10 | 1 | 0 | Yes | No |
| 17958569 | DATA ERASING DEVICE AND DATA ERASING METHOD | October 2022 | July 2024 | Allow | 21 | 0 | 0 | No | No |
| 17955331 | SYSTEMS AND METHODS FOR MULTI-ALGORITHM PROCESSING OF DATASETS WITHIN A ZERO-TRUST ENVIRONMENT | September 2022 | August 2024 | Allow | 22 | 0 | 0 | No | No |
| 17946956 | THROUGHPUT FOR A SINGLE VPN CONNECTION USING MULTIPLE PROCESSING CORES | September 2022 | December 2024 | Allow | 27 | 3 | 0 | Yes | No |
| 17947066 | Secure Channel Estimation Architecture | September 2022 | July 2024 | Allow | 22 | 1 | 0 | Yes | No |
| 17816884 | SYSTEMS AND METHODS FOR APPLYING ATTACK TREE MODELS AND PHYSICS-BASED MODELS FOR DETECTING CYBER-PHYSICAL THREATS | August 2022 | June 2024 | Allow | 22 | 3 | 0 | Yes | No |
| 17870000 | METHOD, APPARATUS, AND COMPUTER-READABLE RECORDING MEDIUM FOR PERFORMING MACHINE LEARNING-BASED OBSERVATION LEVEL MEASUREMENT USING SERVER SYSTEM LOG AND PERFORMING RISK CALCULATION USING THE SAME | July 2022 | December 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17814103 | AUTOMATICALLY DETECTING MISUSE OF LICENSED SOFTWARE | July 2022 | October 2023 | Allow | 15 | 2 | 0 | Yes | No |
| 17868943 | SYSTEMS AND METHODS FOR EVALUATING DATA ACCESS SIGNATURE OF THIRD-PARTY APPLICATIONS | July 2022 | January 2024 | Allow | 18 | 2 | 0 | No | No |
| 17869192 | POST-COMPLETION ACTION MANAGEMENT IN ONLINE DOCUMENT SYSTEM | July 2022 | January 2023 | Allow | 6 | 0 | 0 | Yes | No |
| 17792292 | Apparatus and Method for Protecting Shared Objects | July 2022 | September 2024 | Allow | 26 | 0 | 0 | No | No |
| 17809602 | SYSTEMS AND METHODS FOR PROTECTING THE SECURITY OF AUTHENTICATION CREDENTIALS UTILIZED TO ACCESS SENSITIVE DATA DURING ONLINE TRANSACTIONS | June 2022 | May 2024 | Allow | 22 | 0 | 0 | No | No |
| 17738749 | SECURED AUTOMATIC USER LOG-IN AT WEBSITE VIA PERSONAL ELECTRONIC DEVICE | May 2022 | June 2024 | Allow | 26 | 0 | 0 | Yes | No |
| 17738488 | SESSION ESTABLISHMENT METHOD AND MEANS AND COMMUNICATION SYSTEM | May 2022 | May 2023 | Allow | 12 | 0 | 0 | Yes | No |
| 17731045 | METHOD AND SYSTEM OF PROVIDING ACCESS TO DOCUMENTS STORED IN PERSONAL STORAGE MEDIUMS | April 2022 | March 2024 | Allow | 23 | 0 | 0 | No | No |
| 17660517 | CRYPTOGRAPHIC AUTHENTICATION OF A PHYSICAL ASSET | April 2022 | July 2024 | Allow | 27 | 0 | 0 | Yes | No |
| 17660437 | MANAGEMENT CONTROLLER-BASED VERIFICATION OF PLATFORM CERTIFICATES | April 2022 | October 2024 | Allow | 30 | 0 | 0 | Yes | No |
| 17715993 | MANAGING EXCHANGES BETWEEN EDGE GATEWAYS IN A CLOUD ENVIRONMENT TO SUPPORT A PRIVATE NETWORK CONNECTION | April 2022 | June 2024 | Allow | 26 | 0 | 0 | No | No |
| 17763705 | METHOD AND SYSTEM FOR REMOTE VOTER IDENTITY VERIFICATION AND LIVENESS DETECTION IN AN ONLINE VOTING SYSTEM | March 2022 | December 2024 | Allow | 32 | 1 | 0 | No | No |
| 17701177 | SYSTEM INFORMATION ACCESS USING ISOLATED CABLE | March 2022 | October 2024 | Allow | 31 | 0 | 0 | No | No |
| 17760783 | System and Method to enable Shared SaaS Multi-Tenancy using Customer Data Storage, Customer-controlled Data Encryption Keys | March 2022 | August 2024 | Allow | 29 | 2 | 0 | No | No |
| 17696153 | CRYPTOGRAPHIC ENFORCEMENT OF BORROW CHECKING | March 2022 | February 2024 | Allow | 23 | 0 | 0 | Yes | No |
| 17693550 | Methods and Systems for Efficient Network Protection | March 2022 | May 2025 | Allow | 38 | 1 | 0 | No | No |
| 17689385 | ENHANCED PROCESSING FOR IPSEC STREAM | March 2022 | February 2025 | Allow | 35 | 1 | 0 | No | No |
| 17685240 | COMMUNICATION APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM | March 2022 | April 2024 | Allow | 25 | 2 | 0 | Yes | No |
| 17678560 | IMPLEMENTING POLICY BASED ON UNIQUE ADDRESSES OR PORTS | February 2022 | April 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17677028 | SYSTEMS AND METHODS FOR SECURE CERTIFICATE MANAGEMENT | February 2022 | June 2023 | Allow | 15 | 2 | 0 | Yes | No |
| 17665610 | ASSOCIATIVE HASH TREE | February 2022 | January 2024 | Allow | 23 | 0 | 0 | Yes | No |
| 17665952 | ITEM TRACKING WITH A WIRELESS COMMUNICATION SYSTEM BASED ON A FIFTH GENERATION IDENTIFIER (5GID) AND A GLOBAL TRACKING ITEM NUMBER (GTIN) | February 2022 | March 2024 | Allow | 25 | 0 | 0 | No | No |
| 17592316 | NETWORK ENTITY ID AAA | February 2022 | June 2023 | Allow | 16 | 1 | 0 | Yes | No |
| 17584523 | Software security agent updates via microcode | January 2022 | November 2024 | Allow | 34 | 1 | 0 | Yes | No |
| 17572644 | APPARATUS AND METHOD FOR MAINTAINING SECURITY OF VIDEO DATA | January 2022 | December 2023 | Allow | 23 | 0 | 0 | Yes | No |
| 17572865 | METHOD AND UNCONSTRAINED UE FOR COMMUNICATION OF CONSTRAINED UE WITH MSGIN5G SERVER | January 2022 | May 2024 | Allow | 28 | 0 | 0 | Yes | No |
| 17572042 | BLUETOOTH COMMUNICATION SYSTEM CAPABLE OF INCREASING GENERATION EFFICIENCY OF CYPHER KEYS REQUIRED FOR DATA TRANSMISSION BETWEEN BLUETOOTH HOST DEVICE AND BLUETOOTH DEVICE SET, AND RELATED BLUETOOTH DEVICE SET | January 2022 | January 2024 | Allow | 25 | 1 | 0 | No | No |
| 17572081 | BLUETOOTH COMMUNICATION SYSTEM CAPABLE OF INCREASING GENERATION EFFICIENCY OF CYPHER KEYS REQUIRED FOR DATA TRANSMISSION BETWEEN BLUETOOTH HOST DEVICE AND BLUETOOTH DEVICE SET, AND RELATED BLUETOOTH DEVICE SET | January 2022 | January 2024 | Allow | 25 | 1 | 0 | No | No |
| 17563572 | SYSTEM AND METHOD FOR IMPLEMENTING HACKER TRAFFIC BARRIERS | December 2021 | April 2023 | Allow | 16 | 1 | 0 | Yes | No |
| 17622034 | METHOD AND APPARATUS FOR SUPPORTING UP SECURITY FOR MO-EDT IN CU-DU SPLIT IN A WIRELESS COMMUNICATION SYSTEM | December 2021 | July 2024 | Allow | 31 | 2 | 0 | No | No |
| 17549517 | Secure Channel Estimation Architecture | December 2021 | July 2024 | Allow | 31 | 1 | 0 | Yes | No |
| 17542291 | Context-Based Risk Assessment for an Identity Verification System | December 2021 | January 2024 | Allow | 26 | 0 | 0 | Yes | No |
| 17526004 | RADIO FREQUENCY CAPTURE ANALYSIS REPORTING | November 2021 | April 2024 | Allow | 29 | 1 | 0 | No | No |
| 17518382 | SELECTING A VPN CONNECTION USING NEGOTIATED CRYPTOGRAPHIC ALGORITHMS TO IMPROVE THROUGHPUT | November 2021 | September 2024 | Allow | 34 | 2 | 0 | Yes | Yes |
| 17607517 | NETWORK INFORMATION REPORTING METHOD AND APPARATUS, USER EQUIPMENT, SERVICE NODE AND MEDIUM | October 2021 | October 2024 | Allow | 36 | 1 | 0 | No | No |
| 17510380 | MESSAGE PLATFORM FOR AUTOMATED THREAT SIMULATION, REPORTING, DETECTION, AND REMEDIATION | October 2021 | June 2023 | Abandon | 19 | 1 | 0 | Yes | No |
| 17490575 | SYSTEM AND METHOD FOR PROVIDING A SECURE NETWORK | September 2021 | November 2023 | Allow | 26 | 0 | 0 | No | No |
| 17468821 | SYSTEM FOR LINKING AND PARTITIONING NON-FUNGIBLE TOKENS | September 2021 | November 2023 | Allow | 27 | 0 | 0 | Yes | No |
| 17462260 | COMMUNICATION METHOD AND DEVICE | August 2021 | January 2024 | Abandon | 28 | 1 | 0 | No | No |
| 17460656 | Systems And Methods for Providing Network Diversification and Secure Communications | August 2021 | February 2024 | Abandon | 29 | 2 | 0 | Yes | No |
| 17429945 | DETECTION METHOD, DETECTION SYSTEM, AND DETECTION PROGRAM | August 2021 | October 2023 | Allow | 26 | 0 | 0 | Yes | No |
| 17379495 | HASH-BASED DYNAMIC RESTRICTION OF CONTENT ON INFORMATION RESOURCES | July 2021 | June 2023 | Allow | 23 | 2 | 0 | Yes | No |
| 17378032 | METHOD FOR SECURING IMAGE AND ELECTRONIC DEVICE PERFORMING SAME | July 2021 | March 2025 | Abandon | 44 | 3 | 0 | No | No |
| 17361387 | OAM MEASUREMENT DEVICE INDEPENDENT QUANTUM KEY DISTRIBUTION SYSTEM BASED ON REAL-TIME TRACKING COMPENSATION AND METHOD THEREOF | June 2021 | November 2024 | Allow | 41 | 4 | 0 | Yes | No |
| 17304949 | DYNAMIC VIRTUAL HONEYPOT UTILIZING HONEY TOKENS AND DATA MASKING | June 2021 | January 2024 | Allow | 31 | 1 | 0 | Yes | No |
| 17356141 | SECURE EXECUTION ENVIRONMENT FOR APPLICATIONS USING BLOCKCHAIN | June 2021 | February 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17346130 | QUANTUM KEY DISTRIBUTION FOR SECURE AND PRIVATE TRANSACTIONS | June 2021 | November 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17241000 | SYSTEM AND METHOD FOR CONTENT SCANNING USING SPARSE FILES | April 2021 | August 2023 | Allow | 27 | 1 | 0 | No | No |
| 17238718 | METHOD AND SYSTEM FOR LIMITING ACCESS OF MULTIPLE DATA NODES TO SHARED STORAGE DURING THE PERFORMANCE OF DATA PROTECTION SERVICES THROUGH LOAD BALANCING | April 2021 | September 2023 | Allow | 29 | 0 | 0 | No | No |
| 17222841 | SYSTEMS AND METHODS FOR PROVIDING SECURITY SERVICES DURING POWER MANAGEMENT MODE | April 2021 | August 2023 | Allow | 28 | 2 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner SHAW, BRIAN F.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 80.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner SHAW, BRIAN F works in Art Unit 2432 and has examined 137 patent applications in our dataset. With an allowance rate of 96.4%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 27 months.
Examiner SHAW, BRIAN F's allowance rate of 96.4% places them in the 89% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.
On average, applications examined by SHAW, BRIAN F receive 1.40 office actions before reaching final disposition. This places the examiner in the 30% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by SHAW, BRIAN F is 27 months. This places the examiner in the 56% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +0.7% benefit to allowance rate for applications examined by SHAW, BRIAN F. This interview benefit is in the 14% percentile among all examiners. Note: Interviews show limited statistical benefit with this examiner compared to others, though they may still be valuable for clarifying issues.
When applicants file an RCE with this examiner, 27.8% of applications are subsequently allowed. This success rate is in the 39% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.
This examiner enters after-final amendments leading to allowance in 22.6% of cases where such amendments are filed. This entry rate is in the 21% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 100.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 70% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 88% percentile among all examiners. Of these withdrawals, 80.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 66.7% are granted (fully or in part). This grant rate is in the 83% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.
Examiner's Amendments: This examiner makes examiner's amendments in 0.7% of allowed cases (in the 64% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.