Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18630413 | SYSTEMS AND METHODS FOR REQUESTING UNMANNED AERIAL VEHICLE-BASED SURVEILLANCE SERVICES | April 2024 | June 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18408895 | SYSTEMS AND METHOD FOR SECURE UPDATES OF CONFIGURATION PARAMETERS PROVISIONED IN USER EQUIPMENT | January 2024 | June 2025 | Allow | 17 | 1 | 0 | No | No |
| 18526279 | TECHNOLOGIES FOR UNTRUSTED CODE EXECUTION WITH PROCESSOR SANDBOX SUPPORT | December 2023 | May 2025 | Allow | 18 | 2 | 0 | No | No |
| 18523810 | COMPUTATIONAL RISK ANALYSIS AND INTERMEDIATION | November 2023 | November 2024 | Allow | 12 | 1 | 0 | No | No |
| 18382442 | ENDPOINT SECURITY ARCHITECTURE WITH PROGRAMMABLE LOGIC ENGINE | October 2023 | October 2024 | Allow | 12 | 1 | 0 | No | No |
| 18287547 | GALOIS EXTENSION FIELD-BASED BLOCK CIPHER | October 2023 | June 2025 | Allow | 20 | 0 | 0 | No | No |
| 18343345 | SINGLE SIGN-ON ENABLED WITH OAUTH TOKEN | June 2023 | July 2024 | Allow | 13 | 1 | 0 | Yes | No |
| 18208759 | INTEGRITY PROTECTION FOR USER PLANE DATA IN 5G NETWORK | June 2023 | June 2024 | Allow | 13 | 1 | 0 | No | No |
| 18195357 | System for Quantum Field Noise Source and Secure Information Transfer Therefrom | May 2023 | April 2025 | Allow | 23 | 0 | 0 | No | No |
| 18309871 | VERIFICATION APPLICATION, METHOD, ELECTRONIC DEVICE AND COMPUTER PROGRAM | May 2023 | June 2024 | Abandon | 13 | 1 | 0 | No | No |
| 18186835 | SYSTEMS AND METHODS FOR THE INCREMENTAL AND REVERSIBLE DEPLOYMENT OF A BIOMETRIC IDENTITY MANAGEMENT SYSTEM | March 2023 | November 2024 | Abandon | 20 | 1 | 0 | No | No |
| 18092855 | CREDENTIAL AND AUTHENTICATION MANAGEMENT IN SCALABLE DATA NETWORKS | January 2023 | April 2025 | Abandon | 28 | 1 | 0 | No | No |
| 18066514 | SYSTEMS AND METHODS FOR VALIDATING AND EXTRACTING DATA DYNAMICALLY FROM IMAGES OF IDENTIFICATION DOCUMENTS | December 2022 | April 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18076929 | PRIORITIZED RANKING FOR MEMORY DEVICE PREPARATION | December 2022 | February 2024 | Allow | 15 | 1 | 0 | No | No |
| 17798725 | DATA PROCESSING DEVICE, DATA PROCESSING METHOD, AND DATA PROCESSING PROGRAM | August 2022 | May 2025 | Abandon | 34 | 2 | 0 | No | No |
| 17870395 | Accelerated Encryption During Power Loss | July 2022 | December 2024 | Allow | 28 | 2 | 0 | Yes | No |
| 17866865 | PROCESS LEVEL AUTHENTICATION FOR CLIENT DEVICE ACCESS TO A SERVER SYSTEM | July 2022 | April 2025 | Allow | 33 | 2 | 0 | No | No |
| 17866481 | SYSTEM AND METHOD FOR SAFELY AUTOFILLING LOGIN FIELDS IN COMPUTING SOURCES | July 2022 | March 2025 | Allow | 32 | 2 | 0 | Yes | No |
| 17810911 | ROLE-TEMPLATE-BASED BATCH MANAGEMENT OF TENANT-SPECIFIC ROLES AND RIGHTS IN A COMPUTING SYSTEM | July 2022 | April 2023 | Allow | 9 | 1 | 0 | No | No |
| 17856574 | FLEXIBLE CONTAINER ATTESTATION | July 2022 | June 2023 | Allow | 11 | 1 | 0 | No | No |
| 17825184 | METHOD FOR GENERATING AND AUTHENTICATING THREE-DIMENSIONAL DYNAMIC OTP WITHOUT PASSWORD INPUT | May 2022 | November 2024 | Allow | 30 | 1 | 0 | No | No |
| 17662481 | DELETING STALE OR UNUSED KEYS TO GUARANTEE ZERO PACKET LOSS | May 2022 | September 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17729416 | Systems and Methods for Hybrid Physical Unclonable Functions | April 2022 | August 2024 | Allow | 27 | 2 | 0 | No | No |
| 17729586 | SYSTEMS AND METHODS FOR FACILITATING SECURE AUTHENTICATION WHEN CONDUCTING BLOCKCHAIN OPERATIONS USING CRYPTOGRAPHY-BASED, STORAGE APPLICATIONS | April 2022 | November 2024 | Allow | 31 | 1 | 0 | Yes | No |
| 17659360 | COMPUTING SYSTEM PROVIDING SAAS APPLICATION ACCESS WITH DIFFERENT CAPABILITIES BASED UPON USER PERSONAS | April 2022 | July 2023 | Abandon | 15 | 1 | 0 | No | No |
| 17762085 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, PROGRAM, AND USER INTERFACE | March 2022 | September 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17761861 | METHOD AND DEVICE FOR DETECTING SECURITY BASED ON MACHINE LEARNING IN COMBINATION WITH RULE MATCHING | March 2022 | September 2024 | Allow | 30 | 1 | 0 | No | No |
| 17684949 | SINGLE SIGN-ON ENABLED OAUTH TOKEN | March 2022 | May 2023 | Allow | 14 | 1 | 0 | No | No |
| 17665319 | String Sanitizer Modeling | February 2022 | August 2024 | Allow | 30 | 1 | 0 | No | No |
| 17586127 | BROWSER INTEGRATION WITH CRYPTOGRAM | January 2022 | June 2024 | Allow | 29 | 4 | 0 | Yes | No |
| 17646485 | Rootkit detection based on system dump files analysis | December 2021 | July 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17564286 | INFORMATION SECURITY PROTECTION SYSTEM AND INFORMATION SECURITY PROTECTION METHOD | December 2021 | April 2024 | Allow | 28 | 2 | 0 | No | No |
| 17562952 | MULTIFACTOR AUTHENTICATION THROUGH CRYPTOGRAPHY-ENABLED SMART CARDS | December 2021 | September 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17622635 | METHODS AND DEVICES FOR SECURING A MULTIPLE-ACCESS PERIPHERAL NETWORK | December 2021 | April 2025 | Allow | 40 | 3 | 0 | Yes | No |
| 17558389 | Hardware-Based Obfuscation of Digital Data | December 2021 | April 2024 | Allow | 28 | 2 | 0 | Yes | No |
| 17457934 | DETECTING SECURITY ATTACKS USING WORKSPACE ORCHESTRATION LOGS | December 2021 | February 2025 | Allow | 38 | 3 | 0 | No | No |
| 17544419 | AUTHENTICATION APPARATUS AND METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM | December 2021 | June 2024 | Abandon | 30 | 1 | 0 | No | No |
| 17540455 | INTEGRITY PROTECTION FOR USER PLANE DATA IN 5G NETWORK | December 2021 | March 2023 | Allow | 15 | 1 | 0 | No | No |
| 17456770 | SYSTEM AND METHOD FOR MAINTAINING TENANT DATA ISOLATION IN A MESSAGING SERVICE | November 2021 | August 2024 | Allow | 33 | 2 | 0 | No | No |
| 17533999 | SYSTEMS AND METHODS FOR REQUESTING UNMANNED AERIAL VEHICLE-BASED SURVEILLANCE SERVICES | November 2021 | January 2024 | Allow | 25 | 2 | 0 | Yes | No |
| 17453223 | ENFORCING EULA VERSION AWARE APPLICATION RESPONSE | November 2021 | May 2024 | Allow | 31 | 4 | 0 | No | Yes |
| 17512691 | INFORMATION PROCESSING APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUM STORING INFORMATION PROCESSING PROGRAM, AND INFORMATION PROCESSING METHOD | October 2021 | March 2025 | Abandon | 41 | 1 | 0 | No | No |
| 17606335 | TRUSTED SOLUTIONS FOR ENABLING USER EQUIPMENT BELONGING TO A HOME NETWORK TO ACCESS DATA COMMUNICATION SERVICES IN A VISITED NETWORK | October 2021 | December 2023 | Allow | 26 | 1 | 0 | No | No |
| 17503639 | DATA STORAGE DEVICE, SYSTEM, AND METHOD FOR DIGITAL SIGNATURE | October 2021 | April 2024 | Allow | 29 | 1 | 0 | No | No |
| 17491555 | APPARATUSES AND METHODS FOR ALLOCATING INPUTS AND OUTPUTS IN RESPECT OF INTERFACES OF DEVICES | October 2021 | February 2024 | Allow | 28 | 1 | 0 | No | No |
| 17600456 | GENERATING UNIQUE CRYPTOGRAPHIC KEYS FROM A POOL OF RANDOM ELEMENTS | September 2021 | January 2024 | Allow | 28 | 1 | 0 | No | No |
| 17485999 | SECURE IDENTIFICATION OF WAFER AND CHIP | September 2021 | January 2024 | Allow | 28 | 2 | 0 | No | Yes |
| 17598189 | FUNCTIONS WITH A PRE-CHARGE OPERATION AND AN EVALUATION OPERATION | September 2021 | February 2024 | Allow | 29 | 2 | 0 | No | No |
| 17478789 | Secure Analytics Using Term Generation and Homomorphic Encryption | September 2021 | June 2023 | Allow | 21 | 1 | 0 | No | No |
| 17437695 | WIRELESS DEVICE AND NETWORK NODE FOR VERIFICATION OF A DEVICE AS WELL AS CORRESPONDING METHODS IN A WIRELESS COMMUNICATION SYSTEM | September 2021 | October 2024 | Allow | 37 | 3 | 0 | No | No |
| 17447170 | SECURING POLAR CODES | September 2021 | July 2024 | Abandon | 34 | 3 | 0 | No | No |
| 17435924 | NETWORK PROTECTION | September 2021 | May 2024 | Abandon | 33 | 1 | 0 | No | No |
| 17462585 | Method and Apparatus for Evaluating Phishing Sites to Determine Their Level of Danger and Profile Phisher Behavior | August 2021 | September 2023 | Abandon | 25 | 1 | 0 | No | No |
| 17431713 | COMMUNICATION TERMINAL DEVICE, COMMUNICATION CONTROL METHOD, AND COMMUNICATION CONTROL PROGRAM | August 2021 | March 2025 | Allow | 43 | 4 | 0 | No | No |
| 17432078 | SECURE PASSWORD ENTRY METHOD AND SYSTEM | August 2021 | October 2024 | Allow | 38 | 2 | 0 | No | No |
| 17367106 | TECHNOLOGIES FOR UNTRUSTED CODE EXECUTION WITH PROCESSOR SANDBOX SUPPORT | July 2021 | August 2023 | Allow | 25 | 2 | 0 | No | No |
| 17349278 | IDENTIFYING AN ACTIVE ADMINISTRATION FUNCTION (ADMF) IN A LAWFUL INTERCEPTION DEPLOYMENT THAT UTILIZES A PLURALITY OF ADMFS | June 2021 | June 2023 | Allow | 24 | 1 | 0 | Yes | No |
| 17340188 | SYSTEMS AND METHODS FOR PROTECTION AGAINST THEFT OF USER CREDENTIALS | June 2021 | April 2023 | Allow | 23 | 1 | 0 | Yes | No |
| 17311334 | SECURE CONSENSUS OVER A LIMITED CONNECTION | June 2021 | April 2024 | Allow | 35 | 1 | 0 | No | No |
| 17337678 | COMPUTATIONAL RISK ANALYSIS AND INTERMEDIATION | June 2021 | August 2023 | Allow | 27 | 2 | 0 | No | No |
| 17317156 | SYSTEMS, METHODS, AND STORAGE MEDIA FOR ASSESSMENT AND DISCOVERY OF IDENTITY RESOURCES IN AN IDENTITY INFRASTRUCTURE | May 2021 | February 2025 | Allow | 45 | 4 | 0 | Yes | No |
| 17285779 | COMMUNICATION DEVICE, COMMUNICATION METHOD, AND DATA STRUCTURE | April 2021 | March 2024 | Allow | 35 | 1 | 0 | No | No |
| 17229608 | SELF-SYNCHRONIZING MODE OF OPERATION FOR AN ENCRYPTION/DECRYPTION ALGORITHM | April 2021 | August 2023 | Allow | 28 | 2 | 0 | No | No |
| 17201117 | SECURE DATA MANAGEMENT IN A NETWORK COMPUTING ENVIRONMENT | March 2021 | January 2024 | Allow | 34 | 4 | 0 | Yes | No |
| 17200437 | Web Endpoint Device Having Automatic Switching Between Proxied and Non-Proxied Communication Modes | March 2021 | August 2023 | Allow | 29 | 2 | 0 | No | No |
| 17192249 | GRAPH-BASED SOURCE CODE VULNERABILITY DETECTION SYSTEM | March 2021 | April 2024 | Abandon | 37 | 1 | 0 | No | No |
| 17192000 | INTEGRITY FOR MOBILE NETWORK DATA STORAGE | March 2021 | March 2024 | Allow | 36 | 3 | 0 | No | No |
| 17165901 | REMOTE ACCESS SERVICE INSPECTOR | February 2021 | October 2022 | Allow | 20 | 1 | 0 | No | No |
| 17050398 | DECENTRALIZED DATA VERIFICATION | January 2021 | April 2024 | Allow | 41 | 1 | 0 | No | No |
| 17147370 | IDENTITY AUTHENTICATION METHOD, PERSONAL SECURITY KERNEL NODE, DEVICE, AND MEDIUM | January 2021 | August 2024 | Allow | 43 | 3 | 0 | No | No |
| 17138814 | APPARATUS AND METHOD FOR MULTI-LINK MANAGEMENT IN MULTI-LINK COMMUNICATION SYSTEMS | December 2020 | April 2023 | Allow | 27 | 2 | 0 | Yes | No |
| 17136518 | SYSTEMS AND METHODS FOR PROTECTION AGAINST THEFT OF USER CREDENTIALS | December 2020 | February 2024 | Allow | 38 | 3 | 0 | Yes | No |
| 17128078 | System & Method for Implementing User Watermarks | December 2020 | April 2023 | Allow | 28 | 2 | 0 | No | No |
| 17124816 | CONTEXT-BASED SIMULATION OF CONTENT | December 2020 | April 2024 | Allow | 40 | 5 | 0 | Yes | No |
| 17252721 | SYSTEMS AND METHOD FOR SECURE UPDATES OF CONFIGURATION PARAMETERS PROVISIONED IN USER EQUIPMENT | December 2020 | October 2023 | Allow | 34 | 1 | 0 | No | No |
| 17109097 | GRADUAL PASSWORD ROLLOVER | December 2020 | October 2022 | Allow | 22 | 1 | 0 | Yes | No |
| 17108612 | Method and Apparatus for Network Fraud Detection and Remediation Through Analytics | December 2020 | October 2023 | Allow | 34 | 3 | 0 | No | No |
| 17090759 | Remote Monitoring and Assessment of Operating System Parameters | November 2020 | November 2022 | Allow | 24 | 1 | 0 | Yes | No |
| 17069047 | TECHNIQUES TO GENERATE WIRELESS LOCAL AREA ACCESS NETWORK FAST TRANSITION KEY MATERIAL BASED ON AUTHENTICATION TO A PRIVATE WIRELESS WIDE AREA ACCESS NETWORK | October 2020 | May 2023 | Allow | 31 | 2 | 0 | Yes | No |
| 17033678 | FIRST PROCESSING APPARATUS TO BE CONNECTED TO A SECOND PROCESSING APPARATUS, AND NON-TRANSITORY COMPUTER READABLE MEDIUM | September 2020 | December 2023 | Abandon | 39 | 4 | 0 | Yes | No |
| 17020486 | MULTI-TENANT CRYPTOGRAPHIC MEMORY ISOLATION | September 2020 | February 2023 | Allow | 29 | 2 | 0 | No | No |
| 17007324 | APPARATUS AND METHODS FOR RESTRICTED BINDING OF PORTS | August 2020 | April 2024 | Allow | 43 | 4 | 0 | Yes | No |
| 17006154 | AUTOMATING DIGITAL FORENSIC EVIDENCE COLLECTION | August 2020 | March 2023 | Allow | 31 | 2 | 0 | No | No |
| 16947857 | ASYMMETRIC KEY EXCHANGE BETWEEN USER EQUIPMENT USING SIP | August 2020 | May 2023 | Allow | 33 | 3 | 0 | No | No |
| 16969363 | INTEGRITY PROTECTION FOR USER PLANE DATA IN 5G NETWORK | August 2020 | December 2022 | Abandon | 28 | 2 | 0 | No | No |
| 16992052 | SYSTEMS AND METHODS FOR AUTHENTICATING TIME-SENSITIVE NETWORK ELEMENTS | August 2020 | August 2023 | Allow | 36 | 3 | 0 | Yes | No |
| 16936482 | METHOD AND SYSTEM FOR OPTIMIZING ACCESS TO DATA NODES OF A DATA CLUSTER USING A DATA ACCESS GATEWAY AND METADATA MAPPING BASED BIDDING | July 2020 | October 2023 | Allow | 38 | 3 | 0 | No | No |
| 16936531 | METHOD AND SYSTEM FOR OPTIMIZING ACCESS TO DATA NODES OF A DATA CLUSTER USING A DATA ACCESS GATEWAY AND BIDDING COUNTERS | July 2020 | January 2024 | Allow | 42 | 3 | 0 | No | No |
| 16936469 | METHOD AND SYSTEM FOR OPTIMIZING ACCESS TO DATA NODES OF A DATA CLUSTER USING A DATA ACCESS GATEWAY AND METADATA MAPPING BASED BIDDING IN AN ACCELERATOR POOL | July 2020 | June 2023 | Allow | 35 | 2 | 0 | No | No |
| 16923253 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD | July 2020 | June 2024 | Allow | 47 | 5 | 0 | Yes | No |
| 16919181 | Phishing Detection based on Interaction with End User | July 2020 | July 2023 | Abandon | 37 | 3 | 0 | No | No |
| 16916303 | MODULATION-AGNOSTIC TRANSFORMATIONS USING UNITARY BRAID DIVISIONAL MULTIPLEXING (UBDM) | June 2020 | December 2022 | Allow | 30 | 1 | 0 | Yes | No |
| 16764954 | SYSTEM AND METHOD FOR PERFORMING BUILDING-WIDE WIRELESS NETWORK INTRUSION DETECTION VIA CONNECTED LUMINAIRES | May 2020 | October 2022 | Abandon | 29 | 1 | 0 | No | No |
| 16808731 | GENERATING URLs TO DETECT AUTONOMOUS PROGRAMS SYSTEMS AND METHODS | March 2020 | September 2023 | Allow | 43 | 3 | 0 | Yes | No |
| 16644375 | METHOD AND APPARATUS FOR AUTHENTICATING TERMINAL AND NETWORK IN 5G COMMUNICATION SYSTEM | March 2020 | January 2023 | Allow | 34 | 2 | 0 | No | No |
| 16732888 | Method for Sharing and Searching Playlists | January 2020 | March 2023 | Allow | 38 | 2 | 0 | No | No |
| 16704350 | DATA PROTECTION WITHIN AN UNSECURED STORAGE ENVIRONMENT | December 2019 | May 2022 | Allow | 30 | 1 | 0 | No | No |
| 16610632 | First Network Node, Second Network Node, Wireless Device and Methods Therein for Handling Broadcast Information | November 2019 | September 2022 | Allow | 35 | 1 | 0 | No | No |
| 16653885 | SYSTEM AND METHOD FOR SECURE COMMUNICATIONS | October 2019 | September 2022 | Allow | 35 | 1 | 0 | No | No |
| 16600270 | SYSTEMS AND METHODS FOR THE INCREMENTAL AND REVERSIBLE DEPLOYMENT OF A BIOMETRIC IDENTITY MANAGEMENT SYSTEM | October 2019 | November 2022 | Allow | 37 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner ANDERSON, MICHAEL D.
With a 61.5% reversal rate, the PTAB has reversed the examiner's rejections more often than affirming them. This reversal rate is in the top 25% across the USPTO, indicating that appeals are more successful here than in most other areas.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 44.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner ANDERSON, MICHAEL D works in Art Unit 2433 and has examined 640 patent applications in our dataset. With an allowance rate of 82.7%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 34 months.
Examiner ANDERSON, MICHAEL D's allowance rate of 82.7% places them in the 49% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by ANDERSON, MICHAEL D receive 2.39 office actions before reaching final disposition. This places the examiner in the 82% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by ANDERSON, MICHAEL D is 34 months. This places the examiner in the 23% percentile for prosecution speed. Applications take longer to reach final disposition with this examiner compared to most others.
Conducting an examiner interview provides a +12.9% benefit to allowance rate for applications examined by ANDERSON, MICHAEL D. This interview benefit is in the 54% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 29.7% of applications are subsequently allowed. This success rate is in the 48% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.
This examiner enters after-final amendments leading to allowance in 31.2% of cases where such amendments are filed. This entry rate is in the 37% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 72.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 57% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 68.3% of appeals filed. This is in the 48% percentile among all examiners. Of these withdrawals, 42.9% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 74.5% are granted (fully or in part). This grant rate is in the 89% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.
Examiner's Amendments: This examiner makes examiner's amendments in 0.6% of allowed cases (in the 62% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.