Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18626087 | AUTOMATED CREATION OF TRUSTED NETWORK PERIMETER | April 2024 | September 2024 | Allow | 5 | 1 | 0 | Yes | No |
| 18613728 | Detecting Data Exfiltration and Compromised User Accounts in a Computing Network | March 2024 | January 2025 | Allow | 10 | 1 | 0 | No | No |
| 18440636 | System and Method for Controlling Access Based on Preconditioned Activities | February 2024 | June 2025 | Abandon | 16 | 2 | 0 | No | No |
| 18406799 | NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS | January 2024 | April 2024 | Allow | 3 | 1 | 0 | No | No |
| 18393335 | SYSTEMS AND METHODS FOR PRIORITIZING URL REVIEW FOR SANDBOXING BASED ON ACCELERATED VELOCITIES OF URL FEATURES IN NETWORK TRAFFIC | December 2023 | October 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18543380 | Command and Control Steganographic Communications Detection Engine | December 2023 | October 2024 | Allow | 10 | 1 | 0 | No | No |
| 18523646 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR ENABLING ZERO-KNOWLEDGE PROOF | November 2023 | March 2025 | Allow | 16 | 2 | 0 | No | No |
| 18483041 | SYSTEMS AND METHODS FOR NETWORK SECURITY | October 2023 | August 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18375562 | Honeypot Network Management Based on Probabilistic Detection of Malicious Port Activity | October 2023 | August 2024 | Allow | 11 | 1 | 0 | No | No |
| 18468531 | NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS | September 2023 | October 2023 | Allow | 1 | 0 | 0 | No | No |
| 18241290 | FACILITATING NETWORK CONNECTIVITY | September 2023 | November 2024 | Allow | 15 | 2 | 0 | Yes | No |
| 18449350 | LIVE DISCOVERY OF ENTERPRISE THREATS BASED ON SECURITY QUERY ACTIVITY | August 2023 | March 2024 | Allow | 7 | 0 | 0 | No | No |
| 18361512 | AUTOMATED CREATION OF TRUSTED NETWORK PERIMETER | July 2023 | January 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18195315 | SYSTEMS AND METHODS FOR AUTOMATED ANOMALOUS BEHAVIOR DETECTION AND RISK-SCORING INDIVIDUALS | May 2023 | February 2025 | Allow | 21 | 4 | 0 | Yes | No |
| 18297111 | COMPUTER NETWORKING WITH SECURITY FEATURES | April 2023 | August 2024 | Allow | 16 | 2 | 0 | Yes | No |
| 18191614 | METHOD AND SYSTEM FOR PROCESSING DATA PACKAGES | March 2023 | April 2025 | Allow | 24 | 1 | 0 | No | No |
| 18182979 | SYSTEMS, METHODS, AND DEVICES FOR PREVENTING CREDENTIAL PASSING ATTACKS | March 2023 | June 2025 | Allow | 28 | 1 | 0 | No | No |
| 18114577 | COMPUTER SOFTWARE IMPLEMENTED CYBERSECURITY FOR MATRIX BARCODE INTERACTION WITH SMART DEVICE | February 2023 | March 2025 | Allow | 25 | 1 | 0 | No | No |
| 18157849 | METHOD AND SYSTEM FOR IDENTIFYING AN OPTIMIZED SET OF CODE COMMITS TO PERFORM VULNERABILITY REMEDIATION | January 2023 | March 2025 | Allow | 26 | 1 | 0 | No | No |
| 18094580 | MALICIOUS INCIDENT VISUALIZATION | January 2023 | February 2025 | Allow | 25 | 4 | 0 | Yes | Yes |
| 18149193 | SYSTEM AND METHOD FOR DETECTING AND COUNTERING MALICIOUS CODE | January 2023 | February 2025 | Allow | 26 | 1 | 0 | No | No |
| 18148934 | NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS | December 2022 | September 2023 | Allow | 9 | 2 | 0 | Yes | No |
| 18060186 | HYGIENE COMPLIANCE DATA CHANNEL | November 2022 | April 2025 | Allow | 29 | 1 | 0 | No | No |
| 18058390 | Command and Control Steganographic Communications Detection Engine | November 2022 | November 2023 | Allow | 11 | 1 | 0 | Yes | No |
| 17967416 | ACCESS ENFORCEMENT THROUGH AUTHENTICATION VERIFICATION ENTITY (AVE) | October 2022 | May 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 17957906 | TERMINAL DEVICE VERIFICATION METHOD AND APPARATUS | September 2022 | March 2025 | Allow | 30 | 1 | 0 | No | No |
| 17956776 | FAST FORWARDED SECURITY ISSUE IDENTIFICATION USING DIGITAL TWINS | September 2022 | April 2025 | Allow | 31 | 1 | 0 | Yes | No |
| 17911853 | Cyber Security System and Method | September 2022 | October 2024 | Allow | 25 | 1 | 0 | No | No |
| 17900651 | MALICIOUS WEBSITE DETECTION USING CERTIFICATE CLASSIFIER | August 2022 | June 2025 | Allow | 33 | 2 | 0 | Yes | No |
| 17895631 | WHITELIST-AUTHENTICATED IMAGE AND INTERACTIVE SERVICE | August 2022 | May 2025 | Allow | 33 | 2 | 0 | No | No |
| 17819717 | DETECTION SYSTEM, DETECTION METHOD, AND COMPUTER PROGRAM PRODUCT | August 2022 | May 2025 | Allow | 33 | 1 | 0 | Yes | No |
| 17798985 | SECURITY AND PRIVACY SUPPORT FOR DIRECT WIRELESS COMMUNICATIONS | August 2022 | May 2025 | Allow | 33 | 2 | 0 | No | No |
| 17812909 | CYBERSECURITY THREAT DETECTION UTILIZING UNIFIED IDENTITY MAPPING AND PERMISSION DETECTION | July 2022 | December 2024 | Allow | 29 | 2 | 0 | No | No |
| 17810973 | OBSCURING ELEMENTS BASED ON BROWSER FOCUS | July 2022 | October 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17850130 | EDGE DATA PROCESSING UTILIZING PER-ENDPOINT SUBSCRIBER CONFIGURABLE DATA PROCESSING WORKLOADS | June 2022 | September 2024 | Allow | 26 | 1 | 0 | Yes | No |
| 17753862 | PROVISIONING AND AUTHENTICATING DEVICE CERTIFICATES | March 2022 | January 2025 | Abandon | 34 | 2 | 0 | No | No |
| 17691930 | NETWORK ATTACK PREVENTION SYSTEMS AND METHODS | March 2022 | March 2025 | Allow | 36 | 1 | 0 | Yes | No |
| 17687235 | PRIVACY PREFERENCE BASED DEVICE CONTROLS | March 2022 | February 2025 | Allow | 36 | 1 | 0 | No | No |
| 17633779 | SECURE INFORMATION SHARING SYSTEMS AND METHODS | February 2022 | December 2024 | Allow | 34 | 1 | 0 | No | No |
| 17588748 | DOMAIN-SPECIFIC ACCESS MANAGEMENT USING IP FILTERING | January 2022 | May 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17548680 | TRANSACTION REQUEST CONSTRUCTION METHOD AND APPARATUS, TRANSACTION REQUEST PROCESSING METHOD AND APPARATUS, DEVICE AND STORAGE MEDIUM | December 2021 | July 2024 | Allow | 31 | 1 | 0 | No | No |
| 17546829 | Adaptive Online Service Access Control | December 2021 | December 2024 | Allow | 36 | 2 | 0 | Yes | Yes |
| 17497294 | SYSTEM AND METHOD FOR DETECTING MALICIOUS ATTEMPTS TO DISCOVER VULNERABILITIES IN A WEB APPLICATION | October 2021 | May 2025 | Allow | 43 | 1 | 0 | No | No |
| 17444250 | AUTONOMOUS ALERTING BASED ON DEFINED CATEGORIZATIONS FOR NETWORK SPACE AND NETWORK BOUNDARY CHANGES | August 2021 | November 2023 | Allow | 28 | 1 | 0 | No | No |
| 17423750 | PROVIDING VIRTUAL MACHINES FOR CENTRALIZED INTEGRATION WITH PERIPHERALS INCLUDING BIOMETRIC DEVICES | July 2021 | September 2024 | Allow | 38 | 2 | 0 | No | No |
| 17377261 | AUTONOMOUS VEHICLE SECURITY MEASURES IN RESPONSE TO AN ATTACK ON AN IN-VEHICLE COMMUNICATION NETWORK | July 2021 | March 2024 | Allow | 32 | 3 | 0 | Yes | No |
| 17421254 | METHOD AND SYSTEM FOR INFORMATION TRANSMISSION | July 2021 | February 2025 | Allow | 43 | 1 | 0 | No | No |
| 17367463 | LOGIN AND CONSENT METHODOLOGY THAT FOLLOWS REST PRINCIPLES AND USES THE OAUTH PROTOCOL WITH ATTESTED CLIENTS | July 2021 | September 2024 | Allow | 39 | 1 | 0 | No | No |
| 17357546 | ANOMALOUS ACTION SECURITY ASSESSOR | June 2021 | September 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17304695 | PROTECTING ACCELERATORS FROM MALICIOUS NETWORK FUNCTIONS | June 2021 | July 2024 | Allow | 37 | 1 | 0 | Yes | No |
| 17355484 | COMMUNICATION CONTROL DEVICE AND COMMUNICATION CONTROL SYSTEM | June 2021 | May 2023 | Allow | 23 | 1 | 0 | No | No |
| 17417129 | INTERCEPTING DEVICES | June 2021 | September 2024 | Abandon | 39 | 2 | 0 | Yes | No |
| 17350199 | System and Method for Continuous User Authentication | June 2021 | July 2024 | Abandon | 37 | 1 | 0 | No | No |
| 17343680 | DATA AUGMENTATION FOR THREAT INVESTIGATION IN AN ENTERPRISE NETWORK | June 2021 | February 2024 | Allow | 33 | 3 | 0 | Yes | No |
| 17343670 | LIVE DISCOVERY OF ENTERPRISE THREATS BASED ON SECURITY QUERY ACTIVITY | June 2021 | February 2023 | Allow | 20 | 2 | 0 | Yes | No |
| 17342421 | DETERMINING ADDITIONAL SIGNALS FOR DETERMINING CYBERSECURITY RISK | June 2021 | April 2024 | Allow | 35 | 1 | 0 | Yes | No |
| 17335920 | PERSONALLY IDENTIFIABLE INFORMATION REMOVAL BASED ON PRIVATE AREA LOGIC | June 2021 | December 2023 | Allow | 31 | 1 | 0 | No | No |
| 17334799 | SYSTEM FOR MANAGING IOT DEVICES | May 2021 | March 2023 | Allow | 21 | 1 | 0 | No | No |
| 17332721 | CONDITIONAL SECURITY MEASURES USING ROLLING SET OF RISK SCORES | May 2021 | July 2023 | Allow | 25 | 1 | 0 | Yes | No |
| 17331156 | DYNAMIC SEGMENTATION APPARATUS AND METHOD FOR PREVENTING SPREAD OF SECURITY THREAT | May 2021 | September 2023 | Abandon | 28 | 1 | 0 | No | No |
| 17329953 | METHOD AND DEVICE FOR PROCESSING DATA OF A TECHNICAL SYSTEM | May 2021 | March 2023 | Allow | 22 | 2 | 0 | No | No |
| 17317257 | DETECTING DATA EXFILTRATION AND COMPROMISED USER ACCOUNTS IN A COMPUTING NETWORK | May 2021 | January 2024 | Allow | 32 | 1 | 0 | No | No |
| 17242442 | AUGMENTED REALITY-BASED ACCESS CONTROL FOR NETWORK DEVICES | April 2021 | December 2023 | Allow | 32 | 1 | 0 | Yes | No |
| 17243201 | SYSTEM FOR DETECTION OF ENTITIES ASSOCIATED WITH COMPROMISED RECORDS | April 2021 | July 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17229884 | System, Device, and Method of Determining Cyber Attack Vectors and Mitigating Cyber Attacks | April 2021 | September 2022 | Allow | 17 | 0 | 0 | No | No |
| 17214627 | SYSTEMS AND METHODS FOR PRIORITIZING URL REVIEW FOR SANDBOXING BASED ON ACCELERATED VELOCITIES OF URL FEATURES IN NETWORK TRAFFIC | March 2021 | August 2023 | Allow | 29 | 3 | 0 | Yes | No |
| 17209767 | SCHEDULING METHOD AND APPARATUS, DEVICE AND STORAGE MEDIUM | March 2021 | October 2023 | Allow | 31 | 1 | 0 | Yes | No |
| 17196633 | PROBABILISTICALLY IDENTIFYING ANOMALOUS HONEYPOT ACTIVITY | March 2021 | May 2023 | Allow | 27 | 1 | 0 | No | No |
| 17194766 | CUSTOM TRIGGERS FOR A NETWORK SECURITY EVENT FOR CYBERSECURITY THREAT INTELLIGENCE | March 2021 | August 2023 | Allow | 29 | 1 | 0 | No | No |
| 17186235 | CYBER DIGITAL TWIN SIMULATOR FOR SECURITY CONTROLS REQUIREMENTS | February 2021 | June 2023 | Allow | 28 | 1 | 0 | No | No |
| 17187255 | MEASURING THE SENSITIVITY OF NEURAL NETWORK IMAGE CLASSIFIERS AGAINST ADVERSARIAL ATTACKS | February 2021 | February 2024 | Allow | 36 | 1 | 0 | No | No |
| 17187379 | CYBER SECURITY SYSTEM APPLYING NETWORK SEQUENCE PREDICTION USING TRANSFORMERS | February 2021 | November 2023 | Allow | 33 | 1 | 0 | No | No |
| 17172788 | AUTOMATED AND SCALABLE WORKER ORCHESTRATION FOR CLOUD-BASED COMPUTER FORENSIC ANALYSIS | February 2021 | June 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17166714 | COMPUTER NETWORKING WITH SECURITY FEATURES | February 2021 | February 2023 | Allow | 25 | 1 | 0 | No | No |
| 17161398 | AUTOMATED CREATION OF TRUSTED NETWORK PERIMETER | January 2021 | May 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17263281 | ELECTRONIC DEVICE FOR PROCESSING DIGITAL KEY, AND OPERATION METHOD THEREFOR | January 2021 | March 2023 | Allow | 26 | 1 | 0 | No | No |
| 17154808 | SYSTEMS AND METHODS FOR NETWORK SECURITY | January 2021 | June 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17153605 | Command and Control Steganographic Communications Detection Engine | January 2021 | November 2022 | Allow | 22 | 1 | 0 | No | No |
| 17149855 | ARTIFICIAL INTELLIGENCE REVERSE VENDOR COLLATION | January 2021 | August 2023 | Allow | 30 | 3 | 0 | No | No |
| 17146180 | SYSTEMS AND METHODS FOR AUTOMATED ANOMALOUS BEHAVIOR DETECTION AND RISK-SCORING INDIVIDUALS | January 2021 | December 2022 | Allow | 24 | 1 | 0 | Yes | No |
| 17255851 | FACILITATING NETWORK CONNECTIVITY | December 2020 | May 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17121096 | POLICY-DRIVEN VIEWS OF DATASETS | December 2020 | March 2024 | Allow | 39 | 3 | 0 | Yes | No |
| 17103777 | SECURE AUTHENTICATION FOR A VIRTUAL COMPUTER | November 2020 | April 2024 | Allow | 41 | 3 | 0 | Yes | No |
| 17103131 | SYSTEM SECURITY EVALUATION MODEL | November 2020 | January 2024 | Allow | 38 | 1 | 0 | No | No |
| 17100759 | DATA POLICIES FOR ONLINE SERVICES | November 2020 | April 2025 | Allow | 53 | 3 | 0 | Yes | No |
| 16949945 | SELECTION OF AUTHENTICATION FUNCTION ACCORDING TO ENVIRONMENT OF USER DEVICE | November 2020 | December 2023 | Allow | 37 | 2 | 0 | Yes | No |
| 17096437 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM | November 2020 | November 2023 | Allow | 36 | 1 | 0 | No | No |
| 17090275 | DETECTION OF ABNORMAL OR MALICIOUS ACTIVITY IN POINT-TO-POINT OR PACKET-SWITCHED NETWORKS | November 2020 | October 2023 | Abandon | 35 | 2 | 0 | No | No |
| 16949175 | PROTECTING DATA IN NON-VOLATILE STORAGES PROVIDED TO CLOUDS AGAINST MALICIOUS ATTACKS | October 2020 | January 2023 | Allow | 27 | 2 | 0 | Yes | No |
| 17068868 | DETECTING MANIPULATION OF DATA ON A CAN BUS | October 2020 | November 2022 | Allow | 25 | 2 | 0 | No | No |
| 17066430 | METHODS AND SYSTEMS THAT DETECT AND DEFLECT DENIAL-OF-SERVICE ATTACKS | October 2020 | October 2023 | Abandon | 36 | 2 | 0 | No | No |
| 17037186 | HYBRID INTRUSION DETECTION MODEL FOR CYBER-ATTACKS IN AVIONICS INTERNET GATEWAYS USING EDGE ANALYTICS | September 2020 | December 2022 | Allow | 27 | 1 | 0 | No | No |
| 15733664 | MALWARE BARRIER | September 2020 | June 2022 | Allow | 20 | 0 | 0 | No | No |
| 17031083 | SYSTEM AND METHOD FOR DETECTING AND BLOCKING MALICIOUS ATTACKS ON A NETWORK | September 2020 | October 2022 | Allow | 25 | 1 | 0 | No | No |
| 17031372 | NON-CUSTODIAL TOOL FOR BUILDING DECENTRALIZED COMPUTER APPLICATIONS | September 2020 | November 2022 | Allow | 25 | 1 | 0 | Yes | No |
| 17040480 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR ENABLING ZERO-KNOWLEDGE PROOF | September 2020 | June 2023 | Allow | 33 | 2 | 0 | No | No |
| 17024201 | ADVANCED INTERSTITIAL TECHNIQUES FOR WEB SECURITY | September 2020 | December 2022 | Allow | 27 | 1 | 0 | No | No |
| 16980405 | METHOD AND APPARATUS PROCESSING OF MESSAGE DATA | September 2020 | March 2024 | Abandon | 42 | 4 | 0 | Yes | No |
| 17010376 | COLLECTION OF DIAGNOSTIC INFORMATION IN A DEVICE | September 2020 | September 2023 | Allow | 36 | 1 | 0 | No | No |
| 16998846 | METHOD TO DETECT DATABASE MANAGEMENT SYSTEM SQL CODE ANOMALIES | August 2020 | November 2022 | Allow | 27 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner ALI, AFAQ.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 50.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner ALI, AFAQ works in Art Unit 2434 and has examined 112 patent applications in our dataset. With an allowance rate of 92.9%, this examiner allows applications at a higher rate than most examiners at the USPTO. Applications typically reach final disposition in approximately 29 months.
Examiner ALI, AFAQ's allowance rate of 92.9% places them in the 79% percentile among all USPTO examiners. This examiner is more likely to allow applications than most examiners at the USPTO.
On average, applications examined by ALI, AFAQ receive 1.47 office actions before reaching final disposition. This places the examiner in the 35% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by ALI, AFAQ is 29 months. This places the examiner in the 46% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +5.2% benefit to allowance rate for applications examined by ALI, AFAQ. This interview benefit is in the 30% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 41.5% of applications are subsequently allowed. This success rate is in the 92% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 63.0% of cases where such amendments are filed. This entry rate is in the 85% percentile among all examiners. Strategic Recommendation: This examiner is highly receptive to after-final amendments compared to other examiners. Per MPEP § 714.12, after-final amendments may be entered "under justifiable circumstances." Consider filing after-final amendments with a clear showing of allowability rather than immediately filing an RCE, as this examiner frequently enters such amendments.
When applicants request a pre-appeal conference (PAC) with this examiner, 0.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 7% percentile among all examiners. Note: Pre-appeal conferences show limited success with this examiner compared to others. While still worth considering, be prepared to proceed with a full appeal brief if the PAC does not result in favorable action.
This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 88% percentile among all examiners. Of these withdrawals, 50.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 0.0% are granted (fully or in part). This grant rate is in the 2% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 12% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.