Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18602353 | PROTECTING SERVERLESS APPLICATIONS | March 2024 | February 2025 | Allow | 11 | 0 | 0 | Yes | No |
| 18397610 | SYSTEMS AND METHODS TO DETECT GPS SPOOFING ATTACKS | December 2023 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18529586 | FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALS | December 2023 | January 2025 | Allow | 13 | 0 | 0 | Yes | No |
| 18519789 | RANSOMWARE PROTECTION IN ADVANCED INJECTION-BASED ATTACKS | November 2023 | May 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18485732 | SYSTEMS AND METHODS FOR ENHANCED REMOTE CONNECTIVITY PROVISIONING | October 2023 | March 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18374055 | GAMIFICATION OF TRAINING FOR PHISHING PREVENTION IN METAVERSE | September 2023 | May 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18447357 | SYSTEMS AND METHODS FOR RETRIEVING DATA USING A BROWSER INSTANCE | August 2023 | June 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18345086 | DETECTION OF MALICIOUS PHISHING EMAILS | June 2023 | March 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18259450 | MULTIWORKFLOW AUTHORIZATION SYSTEM AND METHOD | June 2023 | June 2025 | Allow | 24 | 1 | 0 | Yes | No |
| 18197549 | AUTHENTICATION BASED ON USER INTERACTION WITH IMAGES OR OBJECTS | May 2023 | December 2024 | Allow | 19 | 0 | 0 | Yes | No |
| 18314023 | SECURING CONTROL AND USER PLANE SEPARATION IN MOBILE NETWORKS | May 2023 | November 2024 | Allow | 18 | 0 | 0 | Yes | No |
| 18307635 | AUTOMATED MACHINE LEARNING ACCESS RIGHTS ENGINE | April 2023 | March 2025 | Allow | 22 | 0 | 0 | Yes | No |
| 18146658 | DYNAMICALLY SCALABLE APPLICATION FIREWALL DEPLOYMENT FOR CLOUD NATIVE APPLICATIONS | December 2022 | February 2025 | Allow | 26 | 0 | 0 | Yes | No |
| 18145381 | Systems and Methods for Tracking and Identifying Phishing Website Authors | December 2022 | September 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 18061344 | ANOMALY AND RANSOMWARE DETECTION | December 2022 | April 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 17870635 | EDGE-BASED ENTERPRISE NETWORK SECURITY APPLIANCE AND SYSTEM | July 2022 | April 2023 | Allow | 9 | 1 | 0 | Yes | No |
| 17842428 | Network Profile Anti-spoofing On Wireless Gateways | June 2022 | October 2022 | Allow | 4 | 0 | 0 | Yes | No |
| 17715610 | FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALS | April 2022 | September 2023 | Allow | 17 | 0 | 0 | Yes | No |
| 17711472 | SYSTEM AND METHODS FOR SPOOFED DOMAIN IDENTIFICATION AND USER TRAINING | April 2022 | October 2023 | Allow | 18 | 0 | 0 | Yes | No |
| 17652679 | MANAGING CREDENTIALS OF MULTIPLE USERS ON AN ELECTRONIC DEVICE | February 2022 | April 2025 | Allow | 37 | 1 | 0 | Yes | No |
| 17614334 | METHOD FOR PREVENTING DIFFERENTIAL CRYPTANALYSIS ATTACK | November 2021 | September 2022 | Allow | 10 | 0 | 0 | Yes | No |
| 17381641 | WORKSPACE-BASED FIXED PASS-THROUGH MONITORING SYSTEM AND METHOD FOR HARDWARE DEVICES USING A BASEBOARD MANAGEMENT CONTROLLER (BMC) | July 2021 | May 2025 | Allow | 46 | 2 | 0 | Yes | No |
| 17419002 | Method for detecting that a secure element has been temporarily disconnected from a device, and corresponding device | June 2021 | January 2025 | Allow | 43 | 2 | 0 | Yes | No |
| 17240587 | AUTHENTICATION BASED ON USER INTERACTION WITH IMAGES OR OBJECTS | April 2021 | February 2023 | Allow | 22 | 1 | 0 | Yes | No |
| 17233978 | MULTI-DEVICE DIGITAL RIGHTS MANAGEMENT SYSTEM | April 2021 | August 2022 | Allow | 15 | 0 | 0 | Yes | No |
| 17223949 | SYSTEM, METHOD, AND COMPUTER PROGRAM FOR AN UNATTENDED TRAP FOR A NETWORK BRUTE FORCE ATTACK | April 2021 | November 2024 | Allow | 43 | 4 | 0 | Yes | Yes |
| 17213199 | CYBERSECURITY INCIDENT DETECTION SYSTEMS AND TECHNIQUES | March 2021 | December 2024 | Abandon | 45 | 1 | 0 | No | No |
| 17212265 | SYSTEM AND METHOD FOR ROGUE DEVICE DETECTION | March 2021 | September 2024 | Allow | 42 | 2 | 0 | Yes | No |
| 17197807 | Decrypting Secure Packages In A Storage Network | March 2021 | April 2023 | Allow | 25 | 2 | 0 | Yes | No |
| 17164835 | Method for Securing OpenRAN Interfaces | February 2021 | October 2024 | Abandon | 45 | 3 | 0 | No | No |
| 17161491 | IMPERSONATING REQUEST-BASED SECURITY IN CONNECTION-BASED SECURITY ENVIRONMENT | January 2021 | April 2024 | Allow | 38 | 0 | 0 | No | No |
| 17147062 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND RECORDING MEDIUM | January 2021 | February 2024 | Abandon | 37 | 2 | 0 | Yes | No |
| 17139103 | DYNAMICALLY SCALABLE APPLICATION FIREWALL DEPLOYMENT FOR CLOUD NATIVE APPLICATIONS | December 2020 | October 2022 | Allow | 22 | 1 | 0 | Yes | No |
| 17118112 | Systems and Methods for Tracking and Identifying Phishing Website Authors | December 2020 | September 2022 | Allow | 21 | 0 | 0 | Yes | No |
| 17057151 | Message Transmission between Core Network Domains | November 2020 | March 2025 | Allow | 51 | 3 | 0 | Yes | No |
| 17095385 | MALWARE DETONATION | November 2020 | April 2023 | Abandon | 29 | 2 | 0 | Yes | No |
| 17078063 | WIRELESS NETWORK VERIFICATION USING FINGERPRINTS | October 2020 | December 2024 | Allow | 50 | 2 | 0 | Yes | No |
| 17069869 | CONTEXT-AWARE NETWORK POLICY ENFORCEMENT | October 2020 | June 2025 | Abandon | 56 | 3 | 0 | Yes | No |
| 17070855 | ELECTRONIC CIRCUIT IDENTIFICATION (ID) TECHNIQUES USING BOTH A CLIENT-SIDE ID AND A SUPPLIER-SIDE ID | October 2020 | February 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 16995783 | SYSTEMS AND METHODS FOR PROTECTION FROM PHISHING ATTACKS | August 2020 | August 2021 | Abandon | 12 | 1 | 1 | No | No |
| 16917490 | SECURING CONTROL AND USER PLANE SEPARATION IN MOBILE NETWORKS | June 2020 | February 2023 | Allow | 31 | 2 | 0 | Yes | No |
| 16893023 | FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALS | June 2020 | February 2022 | Allow | 21 | 1 | 0 | Yes | No |
| 16889327 | AUTHENTICATION USING A FEEDER ROBOT IN A WEB ENVIRONMENT | June 2020 | January 2022 | Allow | 20 | 0 | 0 | Yes | No |
| 16887650 | UTILIZING WEB APPLICATION FIREWALL AND MACHINE LEARNING TO DETECT COMMAND AND CONTROL | May 2020 | August 2022 | Allow | 26 | 1 | 0 | Yes | No |
| 16877614 | Blockchain Recordation of Device Usage | May 2020 | May 2021 | Allow | 12 | 0 | 0 | Yes | No |
| 16877194 | METHODS AND SYSTEMS FOR DETECTING MALICIOUS SERVERS | May 2020 | December 2021 | Allow | 19 | 0 | 0 | Yes | No |
| 16874421 | CREATING DIGITAL TWINS AT SCALE | May 2020 | July 2022 | Allow | 26 | 0 | 0 | Yes | No |
| 16866619 | METHOD FOR THE EXECUTION OF A BINARY CODE OF A SECURE FUNCTION BY A MICROPROCESSOR | May 2020 | January 2022 | Allow | 21 | 1 | 0 | Yes | No |
| 16865952 | SYSTEM AND METHODS FOR SPOOFED DOMAIN IDENTIFICATION AND USER TRAINING | May 2020 | March 2022 | Allow | 22 | 2 | 0 | Yes | No |
| 16859486 | METHOD, CONTROL TERMINAL AND SYSTEM FOR ACCESSING DEVICE TO NETWORK | April 2020 | February 2023 | Allow | 33 | 1 | 0 | Yes | No |
| 16848012 | NETWORK APPLICATION FIREWALL | April 2020 | February 2023 | Allow | 34 | 3 | 0 | No | No |
| 16841403 | STORAGE IN A NON-VOLATILE MEMORY | April 2020 | December 2020 | Allow | 9 | 0 | 0 | Yes | No |
| 16838163 | DEVICE AND METHOD FOR SECURE PRIVATE DATA AGGREGATION | April 2020 | February 2023 | Allow | 34 | 1 | 0 | Yes | No |
| 16836615 | SYSTEMS AND METHODS FOR INTEGRATING SYSTEMS OVER UNTRUSTED NETWORKS | March 2020 | June 2021 | Allow | 15 | 2 | 0 | Yes | No |
| 16836535 | SYSTEMS AND METHODS FOR INTEGRATING SYSTEMS OVER UNTRUSTED NETWORKS | March 2020 | November 2021 | Allow | 19 | 2 | 0 | Yes | No |
| 16836641 | SYSTEMS AND METHODS FOR INTEGRATING SYSTEMS OVER UNTRUSTED NETWORKS | March 2020 | September 2021 | Allow | 18 | 2 | 0 | Yes | No |
| 16652173 | METHOD AND SYSTEM FOR SECURE STORAGE OF DIGITAL DATA | March 2020 | April 2022 | Allow | 25 | 1 | 0 | No | No |
| 16649480 | Method And System For Multi-Party Unlock In An Inventory Transaction | March 2020 | June 2025 | Allow | 60 | 4 | 0 | Yes | No |
| 16823419 | METHOD FOR EXECUTING A BINARY CODE OF A FUNCTION SECURED BY A MICROPROCESSOR | March 2020 | May 2022 | Allow | 26 | 1 | 0 | No | No |
| 16643891 | Re-Establishing a Connection Between a User Controller Device and a Wireless Device | March 2020 | March 2025 | Allow | 60 | 3 | 0 | Yes | No |
| 16792809 | MANAGING CREDENTIALS OF MULTIPLE USERS ON AN ELECTRONIC DEVICE | February 2020 | November 2021 | Allow | 20 | 1 | 0 | Yes | No |
| 16785312 | METHOD AND APPARATUS FOR DATA TRANSMISSION IN A TEE SYSTEM | February 2020 | March 2020 | Allow | 1 | 0 | 0 | No | No |
| 16785403 | METHOD AND APPARATUS FOR MULTITHREADED DATA TRANSMISSION IN A TEE SYSTEM | February 2020 | May 2020 | Allow | 3 | 1 | 0 | No | No |
| 16733658 | TRIGGER IOT DEVICE AND FUNCTIONAL IOT DEVICE AND IOT SYSTEM ASSOCIATED THEREWITH AND METHOD FOR CONTROLLING THEREOF | January 2020 | November 2022 | Allow | 34 | 1 | 0 | Yes | No |
| 16726459 | CONTROL METHOD FOR ELECTRONIC DEVICE | December 2019 | August 2024 | Abandon | 56 | 5 | 0 | Yes | No |
| 16722126 | IDENTIFYING EPHEMERAL COMPUTING ASSETS USING MACHINE LEARNING | December 2019 | September 2022 | Allow | 32 | 1 | 0 | Yes | No |
| 16712712 | COMMUNICATIONS METHOD AND APPARATUS FOR SECURE COMMUNICATION WHEN A TERMINAL IS IN A RADIO RESOURCE CONTROL INACTIVE STATE | December 2019 | October 2022 | Allow | 34 | 1 | 0 | Yes | No |
| 16686888 | SYSTEMS AND METHODS FOR SECURING USER DOMAIN CREDENTIALS FROM PHISHING ATTACKS | November 2019 | September 2022 | Allow | 34 | 3 | 0 | Yes | No |
| 16685034 | ENABLING BOOSTING PROTOCOLS ON ENCRYPTED DATA | November 2019 | November 2024 | Allow | 60 | 4 | 0 | Yes | No |
| 16680314 | Integrated Systems and Methods Providing Situational Awareness of Operations In An Organization | November 2019 | December 2023 | Allow | 49 | 3 | 0 | Yes | Yes |
| 16670568 | SYSTEM AND METHODS FOR PERFORMING DISTRIBUTED AUTHENTICATION USING A BRIDGE COMPUTER SYSTEM | October 2019 | November 2021 | Allow | 24 | 1 | 0 | Yes | No |
| 16670620 | SECURELY EXECUTING SMART CONTRACT OPERATIONS IN A TRUSTED EXECUTION ENVIRONMENT | October 2019 | July 2020 | Allow | 8 | 1 | 0 | Yes | No |
| 16607207 | ESTABLISHING CONNECTIONS BETWEEN WIFI ACCESS POINTS AND WIRELESS DEVICES VIA LIGHT FIDELITY ACCESS POINTS | October 2019 | June 2023 | Allow | 44 | 2 | 0 | Yes | No |
| 16600280 | SYSTEMS AND METHODS FOR ENHANCED REMOTE CONNECTIVITY PROVISIONING | October 2019 | July 2023 | Allow | 46 | 2 | 0 | Yes | No |
| 16571426 | DYNAMIC DIGITAL CONSENT | September 2019 | July 2020 | Allow | 9 | 1 | 0 | No | No |
| 16571409 | DYNAMIC DIGITAL CONSENT | September 2019 | May 2020 | Allow | 8 | 1 | 0 | No | No |
| 16572347 | DATA PROCESSING SYSTEMS AND METHODS FOR PERFORMING PRIVACY ASSESSMENTS AND MONITORING OF NEW VERSIONS OF COMPUTER CODE FOR PRIVACY COMPLIANCE | September 2019 | November 2020 | Abandon | 14 | 2 | 0 | No | No |
| 16491661 | SYSTEMS AND METHOD TO ADDRESS THE SECURITY VULNERABILITY IN WIRELESS NETWORKS | September 2019 | May 2022 | Allow | 33 | 2 | 0 | Yes | No |
| 16563323 | DISTRIBUTED DATA STORAGE BY MEANS OF AUTHORISATION TOKEN | September 2019 | June 2022 | Allow | 34 | 4 | 0 | Yes | No |
| 16559442 | PERFORMING SCRAMBLING AND/OR DESCRAMBLING ON PARALLEL COMPUTING ARCHITECTURES | September 2019 | November 2023 | Abandon | 50 | 2 | 0 | Yes | No |
| 16487482 | SECURE COMMUNICATION FOR COMMISSIONING AND DECOMMISSIONING CIRCUIT BREAKERS AND PANEL SYSTEM | August 2019 | September 2024 | Allow | 60 | 3 | 0 | Yes | No |
| 16485171 | ATTACK COUNTERMEASURE DETERMINATION APPARATUS, ATTACK COUNTERMEASURE DETERMINATION METHOD, AND ATTACK COUNTERMEASURE DETERMINATION PROGRAM | August 2019 | February 2023 | Allow | 42 | 3 | 0 | Yes | No |
| 16534447 | ANOMALY AND RANSOMWARE DETECTION | August 2019 | August 2022 | Allow | 36 | 1 | 0 | Yes | No |
| 16482256 | CHARACTER STRING CLASSIFICATION METHOD AND SYSTEM, AND CHARACTER STRING CLASSIFICATION DEVICE | July 2019 | June 2022 | Allow | 34 | 1 | 0 | Yes | No |
| 16510578 | IDENTIFYING SPAM USING NEAR-DUPLICATE DETECTION FOR TEXT AND IMAGES | July 2019 | February 2022 | Allow | 32 | 0 | 0 | Yes | No |
| 16476406 | SECURITY ARCHITECTURE FOR MACHINE TYPE COMMUNICATIONS | July 2019 | June 2022 | Abandon | 35 | 2 | 0 | Yes | No |
| 16435831 | METHOD FOR SECURELY MAINTAINING AN ENCRYPTION KEY | June 2019 | January 2025 | Allow | 60 | 2 | 0 | No | Yes |
| 16434412 | MANAGEMENT OF CRYPTOGRAPHICALLY SECURE EXCHANGES OF DATA USING PERMISSIONED DISTRIBUTED LEDGERS | June 2019 | June 2022 | Allow | 37 | 3 | 0 | Yes | No |
| 16430382 | Network Profile Anti-Spoofing on Wireless Gateways | June 2019 | March 2022 | Allow | 33 | 1 | 0 | Yes | No |
| 16422715 | FILE FORMAT AND PLATFORM FOR STORAGE AND VERIFICATION OF CREDENTIALS | May 2019 | April 2020 | Allow | 11 | 1 | 0 | Yes | No |
| 16400654 | TRANSMITTING AND STORING DIFFERENT TYPES OF ENCRYPTED INFORMATION USING TCP URGENT MECHANISM | May 2019 | November 2022 | Allow | 42 | 5 | 0 | Yes | No |
| 16392648 | INTRINSIC DATA GENERATION DEVICE, SEMICONDUCTOR DEVICE AND AUTHENTICATION SYSTEM | April 2019 | March 2024 | Allow | 58 | 2 | 0 | Yes | No |
| 16366870 | METHOD FOR THE PERSONALIZATION OF INTEGRATED CIRCUIT CARDS, CORRESPONDING SYSTEM AND COMPUTER PROGRAM PRODUCT | March 2019 | June 2022 | Allow | 38 | 2 | 0 | Yes | No |
| 16351606 | SECRET SHARING VIA BLOCKCHAIN DISTRIBUTION | March 2019 | March 2020 | Allow | 12 | 0 | 0 | No | No |
| 16064715 | METHOD AND APPARATUS FOR SUPPORTING SECURITY FOR CU-CP AND CU-UP SEPARATION IN WIRELESS COMMUNICATION SYSTEM | March 2019 | November 2021 | Abandon | 41 | 4 | 0 | No | No |
| 16263651 | APPARATUS AND METHOD BY WHICH USER DEVICE IN HOME NETWORK SYSTEM TRANSMITS HOME-DEVICE-RELATED INFORMATION | January 2019 | July 2021 | Allow | 30 | 1 | 0 | Yes | No |
| 16200118 | SECURE PKI COMMUNICATIONS FOR "MACHINE-TO-MACHINE" MODULES, INCLUDING KEY DERIVATION BY MODULES AND AUTHENTICATING PUBLIC KEYS | November 2018 | July 2019 | Allow | 7 | 0 | 0 | No | No |
| 16198066 | FRAMEWORK ACTUATOR INTEGRATION | November 2018 | April 2021 | Allow | 29 | 1 | 0 | Yes | No |
| 16193311 | METHOD FOR DETERMINING AN INTEGRITY SUM, ASSOCIATED COMPUTER PROGRAM AND ELECTRONIC ENTITY | November 2018 | June 2021 | Allow | 31 | 1 | 0 | No | No |
| 16192778 | Detection And Prevention Of Broadcast And Multicast Packet Attacking For Uncovering And Disconnecting Attackers In Wireless Communications | November 2018 | August 2023 | Abandon | 57 | 6 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner NIPA, WASIKA.
With a 50.0% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 57.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner NIPA, WASIKA works in Art Unit 2433 and has examined 333 patent applications in our dataset. With an allowance rate of 79.3%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 30 months.
Examiner NIPA, WASIKA's allowance rate of 79.3% places them in the 41% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by NIPA, WASIKA receive 2.05 office actions before reaching final disposition. This places the examiner in the 68% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by NIPA, WASIKA is 30 months. This places the examiner in the 40% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +25.5% benefit to allowance rate for applications examined by NIPA, WASIKA. This interview benefit is in the 76% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 28.1% of applications are subsequently allowed. This success rate is in the 41% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.
This examiner enters after-final amendments leading to allowance in 12.2% of cases where such amendments are filed. This entry rate is in the 7% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 6% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 71.4% of appeals filed. This is in the 54% percentile among all examiners. Of these withdrawals, 26.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 22.2% are granted (fully or in part). This grant rate is in the 13% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 12% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.