Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18759530 | DATA AUGMENTATION FOR THREAT INVESTIGATION IN AN ENTERPRISE NETWORK | June 2024 | July 2025 | Allow | 13 | 1 | 0 | Yes | No |
| 18626087 | AUTOMATED CREATION OF TRUSTED NETWORK PERIMETER | April 2024 | September 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18613728 | Detecting Data Exfiltration and Compromised User Accounts in a Computing Network | March 2024 | January 2025 | Allow | 10 | 1 | 0 | No | No |
| 18591911 | Authorization of Access Rights Licenses | February 2024 | January 2026 | Allow | 23 | 3 | 0 | No | No |
| 18440636 | System and Method for Controlling Access Based on Preconditioned Activities | February 2024 | June 2025 | Abandon | 16 | 2 | 0 | No | No |
| 18439524 | CYBER SECURITY SYSTEM APPLYING NETWORK SEQUENCE PREDICTION USING TRANSFORMERS | February 2024 | January 2026 | Allow | 23 | 2 | 0 | No | No |
| 18406799 | NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS | January 2024 | April 2024 | Allow | 3 | 1 | 0 | No | No |
| 18393335 | SYSTEMS AND METHODS FOR PRIORITIZING URL REVIEW FOR SANDBOXING BASED ON ACCELERATED VELOCITIES OF URL FEATURES IN NETWORK TRAFFIC | December 2023 | October 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18543380 | Command and Control Steganographic Communications Detection Engine | December 2023 | October 2024 | Allow | 10 | 1 | 0 | No | No |
| 18523646 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR ENABLING ZERO-KNOWLEDGE PROOF | November 2023 | March 2025 | Allow | 16 | 2 | 0 | No | No |
| 18483041 | SYSTEMS AND METHODS FOR NETWORK SECURITY | October 2023 | August 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18375562 | Honeypot Network Management Based on Probabilistic Detection of Malicious Port Activity | October 2023 | August 2024 | Allow | 11 | 1 | 0 | No | No |
| 18468531 | NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS | September 2023 | October 2023 | Allow | 1 | 0 | 0 | No | No |
| 18241290 | FACILITATING NETWORK CONNECTIVITY | September 2023 | November 2024 | Allow | 15 | 2 | 0 | Yes | No |
| 18449350 | LIVE DISCOVERY OF ENTERPRISE THREATS BASED ON SECURITY QUERY ACTIVITY | August 2023 | March 2024 | Allow | 7 | 0 | 0 | No | No |
| 18231044 | SECURE COMMUNICATION METHOD, APPARATUS, AND SYSTEM FOR DC INTERCONNECTION | August 2023 | December 2025 | Abandon | 28 | 1 | 0 | No | No |
| 18361512 | AUTOMATED CREATION OF TRUSTED NETWORK PERIMETER | July 2023 | January 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18195315 | SYSTEMS AND METHODS FOR AUTOMATED ANOMALOUS BEHAVIOR DETECTION AND RISK-SCORING INDIVIDUALS | May 2023 | February 2025 | Allow | 21 | 4 | 0 | Yes | No |
| 18297111 | COMPUTER NETWORKING WITH SECURITY FEATURES | April 2023 | August 2024 | Allow | 16 | 2 | 0 | Yes | No |
| 18297265 | INSTALLATION METHOD NEEDLESS OF MULTIPLE REQUESTS FOR PERMISSIONS, ELECTRONIC DEVICE, AND COMPUTER READABLE STORAGE MEDIUM | April 2023 | July 2025 | Allow | 28 | 2 | 0 | No | No |
| 18191614 | METHOD AND SYSTEM FOR PROCESSING DATA PACKAGES | March 2023 | April 2025 | Allow | 24 | 1 | 0 | No | No |
| 18182979 | SYSTEMS, METHODS, AND DEVICES FOR PREVENTING CREDENTIAL PASSING ATTACKS | March 2023 | June 2025 | Allow | 28 | 1 | 0 | No | No |
| 18114577 | COMPUTER SOFTWARE IMPLEMENTED CYBERSECURITY FOR MATRIX BARCODE INTERACTION WITH SMART DEVICE | February 2023 | March 2025 | Allow | 25 | 1 | 0 | No | No |
| 18017656 | SYSTEM FOR ENCRYPTING AND AUTHENTICATING COMMUNICATIONS WITH MUTUAL AUTHENTICATION OF THE COMMUNICATORS | January 2023 | July 2025 | Allow | 30 | 1 | 0 | No | No |
| 18157849 | METHOD AND SYSTEM FOR IDENTIFYING AN OPTIMIZED SET OF CODE COMMITS TO PERFORM VULNERABILITY REMEDIATION | January 2023 | March 2025 | Allow | 26 | 1 | 0 | No | No |
| 18094580 | MALICIOUS INCIDENT VISUALIZATION | January 2023 | February 2025 | Allow | 25 | 4 | 0 | Yes | Yes |
| 18149193 | SYSTEM AND METHOD FOR DETECTING AND COUNTERING MALICIOUS CODE | January 2023 | February 2025 | Allow | 26 | 1 | 0 | No | No |
| 18148934 | NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS | December 2022 | September 2023 | Allow | 9 | 2 | 0 | Yes | No |
| 18084007 | CONTROL FLOW INTEGRITY MONITORING BASED INSIGHTS | December 2022 | September 2025 | Allow | 33 | 3 | 0 | Yes | No |
| 18060186 | HYGIENE COMPLIANCE DATA CHANNEL | November 2022 | April 2025 | Allow | 29 | 1 | 0 | No | No |
| 18072057 | VULNERABILITY SCANNING OF HIDDEN NETWORK SYSTEMS | November 2022 | October 2025 | Allow | 34 | 3 | 0 | No | No |
| 18058390 | Command and Control Steganographic Communications Detection Engine | November 2022 | November 2023 | Allow | 11 | 1 | 0 | Yes | No |
| 17988494 | NETWORK INTRUSION DETECTION IN A LARGE-SCALE AUTHENICATION SCENARIO | November 2022 | September 2025 | Allow | 34 | 2 | 0 | No | No |
| 18050952 | MULTI-FACTOR AUTHENTICATION USING BLOCKCHAIN | October 2022 | October 2025 | Allow | 36 | 1 | 0 | Yes | No |
| 17920267 | AUTHENTICATION AND CALIBRATION VIA GAZE TRACKING | October 2022 | November 2025 | Allow | 37 | 4 | 0 | Yes | No |
| 17967416 | ACCESS ENFORCEMENT THROUGH AUTHENTICATION VERIFICATION ENTITY (AVE) | October 2022 | May 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 17957906 | TERMINAL DEVICE VERIFICATION METHOD AND APPARATUS | September 2022 | March 2025 | Allow | 30 | 1 | 0 | No | No |
| 17956776 | FAST FORWARDED SECURITY ISSUE IDENTIFICATION USING DIGITAL TWINS | September 2022 | April 2025 | Allow | 31 | 1 | 0 | Yes | No |
| 17913235 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, RECORDING MEDIUM, INFORMATION PROCESSING SYSTEM | September 2022 | August 2025 | Abandon | 35 | 2 | 0 | No | No |
| 17911853 | Cyber Security System and Method | September 2022 | October 2024 | Allow | 25 | 1 | 0 | No | No |
| 17900651 | MALICIOUS WEBSITE DETECTION USING CERTIFICATE CLASSIFIER | August 2022 | June 2025 | Allow | 33 | 2 | 0 | Yes | No |
| 17895631 | WHITELIST-AUTHENTICATED IMAGE AND INTERACTIVE SERVICE | August 2022 | May 2025 | Allow | 33 | 2 | 0 | No | No |
| 17819717 | DETECTION SYSTEM, DETECTION METHOD, AND COMPUTER PROGRAM PRODUCT | August 2022 | May 2025 | Allow | 33 | 1 | 0 | Yes | No |
| 17798985 | SECURITY AND PRIVACY SUPPORT FOR DIRECT WIRELESS COMMUNICATIONS | August 2022 | May 2025 | Allow | 33 | 2 | 0 | No | No |
| 17886246 | ENCRYPTED COMMUNICATION METHOD AND ELECTRONIC DEVICE | August 2022 | November 2025 | Allow | 39 | 2 | 0 | No | No |
| 17812909 | CYBERSECURITY THREAT DETECTION UTILIZING UNIFIED IDENTITY MAPPING AND PERMISSION DETECTION | July 2022 | December 2024 | Allow | 29 | 2 | 0 | No | No |
| 17860265 | OPC UA-Based Anomaly Detection and Recovery System and Method | July 2022 | March 2026 | Allow | 44 | 3 | 0 | Yes | No |
| 17810973 | OBSCURING ELEMENTS BASED ON BROWSER FOCUS | July 2022 | October 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17850130 | EDGE DATA PROCESSING UTILIZING PER-ENDPOINT SUBSCRIBER CONFIGURABLE DATA PROCESSING WORKLOADS | June 2022 | September 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17753862 | PROVISIONING AND AUTHENTICATING DEVICE CERTIFICATES | March 2022 | January 2025 | Abandon | 34 | 2 | 0 | No | No |
| 17691930 | NETWORK ATTACK PREVENTION SYSTEMS AND METHODS | March 2022 | March 2025 | Allow | 36 | 1 | 0 | Yes | No |
| 17687235 | PRIVACY PREFERENCE BASED DEVICE CONTROLS | March 2022 | February 2025 | Allow | 36 | 1 | 0 | No | No |
| 17633779 | SECURE INFORMATION SHARING SYSTEMS AND METHODS | February 2022 | December 2024 | Allow | 34 | 1 | 0 | No | No |
| 17588748 | DOMAIN-SPECIFIC ACCESS MANAGEMENT USING IP FILTERING | January 2022 | May 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17646234 | TECHNIQUES FOR DETECTING CYBER-ATTACK SCANNERS | December 2021 | October 2025 | Allow | 46 | 4 | 0 | Yes | No |
| 17548680 | TRANSACTION REQUEST CONSTRUCTION METHOD AND APPARATUS, TRANSACTION REQUEST PROCESSING METHOD AND APPARATUS, DEVICE AND STORAGE MEDIUM | December 2021 | July 2024 | Allow | 31 | 1 | 0 | No | No |
| 17546829 | Adaptive Online Service Access Control | December 2021 | December 2024 | Allow | 36 | 2 | 0 | Yes | Yes |
| 17497294 | SYSTEM AND METHOD FOR DETECTING MALICIOUS ATTEMPTS TO DISCOVER VULNERABILITIES IN A WEB APPLICATION | October 2021 | May 2025 | Allow | 43 | 1 | 0 | No | No |
| 17448303 | MEASUREMENT APPARATUS | September 2021 | August 2025 | Abandon | 47 | 2 | 0 | No | No |
| 17444250 | AUTONOMOUS ALERTING BASED ON DEFINED CATEGORIZATIONS FOR NETWORK SPACE AND NETWORK BOUNDARY CHANGES | August 2021 | November 2023 | Allow | 28 | 1 | 0 | No | No |
| 17423750 | PROVIDING VIRTUAL MACHINES FOR CENTRALIZED INTEGRATION WITH PERIPHERALS INCLUDING BIOMETRIC DEVICES | July 2021 | September 2024 | Allow | 38 | 2 | 0 | No | No |
| 17377261 | AUTONOMOUS VEHICLE SECURITY MEASURES IN RESPONSE TO AN ATTACK ON AN IN-VEHICLE COMMUNICATION NETWORK | July 2021 | March 2024 | Allow | 32 | 3 | 0 | Yes | No |
| 17421254 | METHOD AND SYSTEM FOR INFORMATION TRANSMISSION | July 2021 | February 2025 | Allow | 43 | 1 | 0 | No | No |
| 17367463 | LOGIN AND CONSENT METHODOLOGY THAT FOLLOWS REST PRINCIPLES AND USES THE OAUTH PROTOCOL WITH ATTESTED CLIENTS | July 2021 | September 2024 | Allow | 39 | 1 | 0 | No | No |
| 17304695 | PROTECTING ACCELERATORS FROM MALICIOUS NETWORK FUNCTIONS | June 2021 | July 2024 | Allow | 37 | 1 | 0 | Yes | No |
| 17357546 | ANOMALOUS ACTION SECURITY ASSESSOR | June 2021 | September 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17355484 | COMMUNICATION CONTROL DEVICE AND COMMUNICATION CONTROL SYSTEM | June 2021 | May 2023 | Allow | 23 | 1 | 0 | No | No |
| 17417129 | INTERCEPTING DEVICES | June 2021 | September 2024 | Abandon | 39 | 2 | 0 | Yes | No |
| 17350199 | System and Method for Continuous User Authentication | June 2021 | July 2024 | Abandon | 37 | 1 | 0 | No | No |
| 17343670 | LIVE DISCOVERY OF ENTERPRISE THREATS BASED ON SECURITY QUERY ACTIVITY | June 2021 | February 2023 | Allow | 20 | 2 | 0 | Yes | No |
| 17343680 | DATA AUGMENTATION FOR THREAT INVESTIGATION IN AN ENTERPRISE NETWORK | June 2021 | February 2024 | Allow | 33 | 3 | 0 | Yes | No |
| 17342421 | DETERMINING ADDITIONAL SIGNALS FOR DETERMINING CYBERSECURITY RISK | June 2021 | April 2024 | Allow | 35 | 1 | 0 | Yes | No |
| 17335920 | PERSONALLY IDENTIFIABLE INFORMATION REMOVAL BASED ON PRIVATE AREA LOGIC | June 2021 | December 2023 | Allow | 31 | 1 | 0 | No | No |
| 17334799 | SYSTEM FOR MANAGING IOT DEVICES | May 2021 | March 2023 | Allow | 21 | 1 | 0 | No | No |
| 17332721 | CONDITIONAL SECURITY MEASURES USING ROLLING SET OF RISK SCORES | May 2021 | July 2023 | Allow | 25 | 1 | 0 | Yes | No |
| 17331156 | DYNAMIC SEGMENTATION APPARATUS AND METHOD FOR PREVENTING SPREAD OF SECURITY THREAT | May 2021 | September 2023 | Abandon | 28 | 1 | 0 | No | No |
| 17329953 | METHOD AND DEVICE FOR PROCESSING DATA OF A TECHNICAL SYSTEM | May 2021 | March 2023 | Allow | 22 | 2 | 0 | No | No |
| 17317257 | DETECTING DATA EXFILTRATION AND COMPROMISED USER ACCOUNTS IN A COMPUTING NETWORK | May 2021 | January 2024 | Allow | 32 | 1 | 0 | No | No |
| 17243201 | SYSTEM FOR DETECTION OF ENTITIES ASSOCIATED WITH COMPROMISED RECORDS | April 2021 | July 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17242442 | AUGMENTED REALITY-BASED ACCESS CONTROL FOR NETWORK DEVICES | April 2021 | December 2023 | Allow | 32 | 1 | 0 | Yes | No |
| 17229884 | System, Device, and Method of Determining Cyber Attack Vectors and Mitigating Cyber Attacks | April 2021 | September 2022 | Allow | 17 | 0 | 0 | No | No |
| 17214627 | SYSTEMS AND METHODS FOR PRIORITIZING URL REVIEW FOR SANDBOXING BASED ON ACCELERATED VELOCITIES OF URL FEATURES IN NETWORK TRAFFIC | March 2021 | August 2023 | Allow | 29 | 3 | 0 | Yes | No |
| 17209767 | SCHEDULING METHOD AND APPARATUS, DEVICE AND STORAGE MEDIUM | March 2021 | October 2023 | Allow | 31 | 1 | 0 | Yes | No |
| 17196633 | PROBABILISTICALLY IDENTIFYING ANOMALOUS HONEYPOT ACTIVITY | March 2021 | May 2023 | Allow | 27 | 1 | 0 | No | No |
| 17194766 | CUSTOM TRIGGERS FOR A NETWORK SECURITY EVENT FOR CYBERSECURITY THREAT INTELLIGENCE | March 2021 | August 2023 | Allow | 29 | 1 | 0 | No | No |
| 17186235 | CYBER DIGITAL TWIN SIMULATOR FOR SECURITY CONTROLS REQUIREMENTS | February 2021 | June 2023 | Allow | 28 | 1 | 0 | No | No |
| 17187255 | MEASURING THE SENSITIVITY OF NEURAL NETWORK IMAGE CLASSIFIERS AGAINST ADVERSARIAL ATTACKS | February 2021 | February 2024 | Allow | 36 | 1 | 0 | No | No |
| 17187379 | CYBER SECURITY SYSTEM APPLYING NETWORK SEQUENCE PREDICTION USING TRANSFORMERS | February 2021 | November 2023 | Allow | 33 | 1 | 0 | No | No |
| 17172788 | AUTOMATED AND SCALABLE WORKER ORCHESTRATION FOR CLOUD-BASED COMPUTER FORENSIC ANALYSIS | February 2021 | June 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17166714 | COMPUTER NETWORKING WITH SECURITY FEATURES | February 2021 | February 2023 | Allow | 25 | 1 | 0 | No | No |
| 17161398 | AUTOMATED CREATION OF TRUSTED NETWORK PERIMETER | January 2021 | May 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17263281 | ELECTRONIC DEVICE FOR PROCESSING DIGITAL KEY, AND OPERATION METHOD THEREFOR | January 2021 | March 2023 | Allow | 26 | 1 | 0 | No | No |
| 17154808 | SYSTEMS AND METHODS FOR NETWORK SECURITY | January 2021 | June 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17153605 | Command and Control Steganographic Communications Detection Engine | January 2021 | November 2022 | Allow | 22 | 1 | 0 | No | No |
| 17149855 | ARTIFICIAL INTELLIGENCE REVERSE VENDOR COLLATION | January 2021 | August 2023 | Allow | 30 | 3 | 0 | No | No |
| 17146180 | SYSTEMS AND METHODS FOR AUTOMATED ANOMALOUS BEHAVIOR DETECTION AND RISK-SCORING INDIVIDUALS | January 2021 | December 2022 | Allow | 24 | 1 | 0 | Yes | No |
| 17255851 | FACILITATING NETWORK CONNECTIVITY | December 2020 | May 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17121096 | POLICY-DRIVEN VIEWS OF DATASETS | December 2020 | March 2024 | Allow | 39 | 3 | 0 | Yes | No |
| 17103777 | SECURE AUTHENTICATION FOR A VIRTUAL COMPUTER | November 2020 | April 2024 | Allow | 41 | 3 | 0 | Yes | No |
| 17103131 | SYSTEM SECURITY EVALUATION MODEL | November 2020 | January 2024 | Allow | 38 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner ALI, AFAQ.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 100.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner ALI, AFAQ works in Art Unit 2434 and has examined 78 patent applications in our dataset. With an allowance rate of 89.7%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 31 months.
Examiner ALI, AFAQ's allowance rate of 89.7% places them in the 72% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by ALI, AFAQ receive 1.55 office actions before reaching final disposition. This places the examiner in the 29% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by ALI, AFAQ is 31 months. This places the examiner in the 55% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +6.8% benefit to allowance rate for applications examined by ALI, AFAQ. This interview benefit is in the 35% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 41.9% of applications are subsequently allowed. This success rate is in the 93% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 61.1% of cases where such amendments are filed. This entry rate is in the 86% percentile among all examiners. Strategic Recommendation: This examiner is highly receptive to after-final amendments compared to other examiners. Per MPEP § 714.12, after-final amendments may be entered "under justifiable circumstances." Consider filing after-final amendments with a clear showing of allowability rather than immediately filing an RCE, as this examiner frequently enters such amendments.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 7% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 90% percentile among all examiners. Of these withdrawals, 100.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 0.0% are granted (fully or in part). This grant rate is in the 2% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.