Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19301719 | METHODS FOR NON-INVASIVE API DISCOVERY, MONITORING AND EXPLOITATION DETECTION IN THIRD-PARTY PROCESSES | August 2025 | November 2025 | Allow | 3 | 0 | 0 | No | No |
| 19014413 | ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHOD | January 2025 | February 2026 | Allow | 13 | 1 | 0 | No | No |
| 18966712 | WATERMARKING DIGITAL MEDIA FOR CONTENT VERIFICATION WITH DIFFERENTIAL DETECTION | December 2024 | October 2025 | Allow | 11 | 0 | 0 | No | No |
| 18912441 | SECURE TAMPER RESISTANT DATA PROCESSING, STORAGE, AND TRANSMISSION GATEWAY AND CONTROLLER AND DATA ANOMALY DETECTION PROGRAM | October 2024 | March 2026 | Allow | 17 | 0 | 0 | Yes | No |
| 18851393 | SINGLE REQUEST ARCHITECTURE FOR INCREASING EFFICIENCY OF SECURE MULTI-PARTY COMPUTATIONS | September 2024 | January 2026 | Allow | 15 | 0 | 0 | No | No |
| 18843024 | PROOF OF DATA RETENTION WITH BLOCKCHAIN | August 2024 | March 2026 | Allow | 18 | 0 | 0 | Yes | No |
| 18799687 | MULTI-ROUTE VIRTUAL PRIVATE NETWORKING | August 2024 | December 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18797912 | METHODS, COMPUTER DEVICES, AND NON-TRANSITORY COMPUTER-READABLE RECORD MEDIA FOR LEARNING OF WATERMARKING MODEL USING COMPLEX ATTACK | August 2024 | December 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18795848 | REAL-TIME PREVENTION OF MALICIOUS CONTENT VIA DYNAMIC ANALYSIS | August 2024 | February 2026 | Allow | 18 | 1 | 0 | No | No |
| 18795033 | COMPUTER INVESTIGATION METHOD AND SYSTEM | August 2024 | December 2024 | Allow | 5 | 0 | 0 | Yes | No |
| 18790505 | TRAINING AND USING MULTI-TASK PREDICTIVE RISK MODELS IN SOFTWARE APPLICATIONS | July 2024 | December 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18779858 | WATERMARKING DIGITAL MEDIA FOR AUTHENTICATED CONTENT VERIFICATION | July 2024 | October 2024 | Allow | 2 | 0 | 0 | Yes | No |
| 18772926 | PERIPHERAL DEVICE SANDBOX | July 2024 | February 2026 | Allow | 19 | 1 | 0 | No | No |
| 18769044 | APPARATUS AND METHOD FOR PERFORMING THREAT ANALYSIS AND RISK ASSESSMENT FOR VEHICLE CYBERSECURITY | July 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18759745 | ENTITY MALICIOUSNESS ANALYSIS USING AUTONOMOUS ARTIFICIAL INTELLIGENCE AGENTS | June 2024 | October 2025 | Allow | 15 | 0 | 0 | No | No |
| 18756295 | SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATION | June 2024 | December 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18754090 | MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT USING ENRICHMENT INFORMATION | June 2024 | April 2025 | Allow | 9 | 1 | 0 | Yes | No |
| 18744401 | INSPECTING REQUESTS AND RESPONSES TO IDENTIFY APPLICATION VULNERABILITIES | June 2024 | September 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18735120 | PRESERVING CONFIDENTIALITY OF TENANTS | June 2024 | February 2026 | Allow | 20 | 1 | 0 | No | No |
| 18732277 | SYSTEM AND METHOD FOR MANAGING THREATS IN OPEN TRANSACTION NETWORKS | June 2024 | November 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18680079 | AUTHENTICATION FOR WIRELESS NETWORKS | May 2024 | February 2026 | Allow | 20 | 1 | 0 | No | No |
| 18672970 | HYBRID PKI KEYLOADER METHODS AND SYSTEMS | May 2024 | October 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18662868 | Systems And Methods For Zero-Shot Detection Of Malicious Network Communications Through Deployment Of Artificial Intelligence Techniques | May 2024 | August 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18649585 | Accessing Cloud Environments Through Administrative Tenancies To Comply With Sovereignty Requirements | April 2024 | December 2025 | Allow | 20 | 1 | 0 | Yes | No |
| 18646225 | CONTENT PERMISSION PLATFORM | April 2024 | June 2025 | Abandon | 14 | 1 | 0 | No | No |
| 18645084 | REAL-TIME RANSOM AND SECURITY BREACH DETECTION AND PREVENTION | April 2024 | August 2025 | Allow | 16 | 0 | 0 | Yes | No |
| 18639867 | BYZANTINE SITUATION-AWARE DEFENSIVE SYSTEM FOR ZERO TRUST ARCHITECTURES | April 2024 | October 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18638944 | Analyzing Cloud-Based Services for Compliance with Multiple Regulations | April 2024 | December 2025 | Allow | 19 | 1 | 0 | No | No |
| 18632965 | Recommendations for cybersecurity based on threat intelligence | April 2024 | December 2025 | Allow | 20 | 1 | 0 | No | No |
| 18621269 | ACKNOWLEDGMENT AUTHENTICATION SYSTEM AND METHOD | March 2024 | October 2024 | Allow | 6 | 0 | 0 | Yes | No |
| 18611444 | SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO FEATURES OF AN ELECTRONIC DEVICE | March 2024 | November 2025 | Allow | 19 | 1 | 0 | No | No |
| 18602470 | QUANTUM SECURITY SYSTEM AND METHOD FOR CLASSICAL AND QUANTUM NETWORKS | March 2024 | November 2025 | Allow | 20 | 1 | 0 | Yes | No |
| 18591842 | Message Authenticated Communication Sessions | February 2024 | January 2025 | Allow | 11 | 1 | 0 | Yes | No |
| 18592430 | THREAT DETECTION AND REMEDIATION | February 2024 | February 2026 | Allow | 23 | 1 | 0 | No | No |
| 18585186 | THREAT MITIGATION SYSTEM AND METHOD | February 2024 | January 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18582933 | CYBERTHREAT REMEDIATION USING A ZERO TRUST ENGINE | February 2024 | August 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18425835 | SECURITY ENGINE FOR APPLICATION DEPLOYMENT PIPELINES | January 2024 | July 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18411018 | PRE-AUTHORIZATION ACCESS REQUEST SCREENING | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18407496 | SCAN ENGINE EXTENSION FOR CUSTOMIZING APPLICATION SECURITY TESTING BEHAVIOR | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18576130 | INFORMATION MANAGEMENT SYSTEM, INFORMATION MANAGEMENT METHOD, AND INFORMATION SHARING SYSTEM | January 2024 | July 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18571986 | ATTACK SCENARIO GENERATING APPARATUS, ATTACK SCENARIO GENERATING METHOD, AND COMPUTER READABLE RECORDING MEDIUM | December 2023 | February 2026 | Allow | 26 | 1 | 0 | No | No |
| 18488232 | SYSTEMS AND METHODS FOR RISK ASSESSMENT OF USER ACCESSES TO DATA RESOURCES | October 2023 | June 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18374962 | SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATION | September 2023 | May 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18457087 | METHODS AND SYSTEMS FOR ONBOARDING NETWORK EQUIPMENT | August 2023 | May 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18237120 | METHOD AND SYSTEM FOR ENSURING COMPLIANCE OF COMPUTING SYSTEMS | August 2023 | August 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18228982 | MANAGING SECURITY ACTIONS IN A COMPUTING ENVIRONMENT BASED ON MOVEMENT OF A SECURITY THREAT | August 2023 | May 2024 | Allow | 9 | 1 | 0 | Yes | No |
| 18360597 | BROWSER SECURITY VIA DOCUMENT OBJECT MODEL MANIPULATION | July 2023 | February 2026 | Allow | 30 | 2 | 0 | Yes | No |
| 18215992 | Generative Artificial Intelligence for a Network Security Scanner | June 2023 | June 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18343716 | DYNAMIC CYBERATTACK MISSION PLANNING AND ANALYSIS | June 2023 | June 2025 | Allow | 24 | 0 | 0 | No | No |
| 18342101 | HIERARCHICAL NOVELTY DETECTION USING INTENDED STATES FOR NETWORK SECURITY | June 2023 | December 2024 | Abandon | 18 | 1 | 0 | No | No |
| 18212859 | Using Machine Learning for Collision Detection to Prevent Unauthorized Access | June 2023 | January 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18332303 | CUMULATIVE SUM MODEL FOR IP DENY LISTS | June 2023 | February 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18206018 | SYSTEMS AND METHODS FOR TRUSTED CHAIN CODE SYSTEM | June 2023 | February 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18201162 | Method and System for Making Identity Decisions | May 2023 | April 2025 | Allow | 22 | 0 | 0 | Yes | No |
| 18195680 | Message Authenticated Communication Sessions | May 2023 | February 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18308786 | ADDRESS GENERATION METHOD, BLOCKCHAIN INFORMATION PROCESSING METHOD, AND RELATED DEVICE | April 2023 | April 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18296008 | DATA PLANE FRAMEWORK FOR REDIRECTING DATA PACKETS | April 2023 | April 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18194791 | ONTOLOGY-BASED RISK PROPAGATION OVER DIGITAL TWINS | April 2023 | January 2025 | Allow | 22 | 0 | 0 | No | No |
| 18128037 | METHOD AND APPARATUS FOR PROVIDING A SHARED MOBILITY SERVICE | March 2023 | February 2026 | Allow | 34 | 1 | 0 | No | No |
| 18125223 | DYNAMIC COMPUTING PLATFORM FOR REAL-TIME DATA CONTAINER GENERATION, AUTHORIZATION, AND THROTTLING MANAGEMENT | March 2023 | October 2025 | Allow | 31 | 0 | 0 | No | No |
| 18123075 | SUSPICIOUS COMMUNICATION DETECTION APPARATUS, SUSPICIOUS COMMUNICATION DETECTION METHOD, AND SUSPICIOUS COMMUNICATION DETECTION PROGRAM | March 2023 | February 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18117770 | EVENT EVALUATION PIPELINE FOR ALERT ENGINE | March 2023 | November 2024 | Allow | 21 | 1 | 0 | No | No |
| 18112149 | DATA PROCESSING SYSTEMS AND METHODS FOR AUTOMATICALLY DETECTING AND DOCUMENTING PRIVACY-RELATED ASPECTS OF COMPUTER SOFTWARE | February 2023 | September 2024 | Allow | 19 | 1 | 0 | Yes | No |
| 18104153 | AUGMENTED INTELLIGENT MACHINE FOR SYSTEMATIC ATTRIBUTION OF DATA SECURITY | January 2023 | November 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 18158105 | Automatic Vulnerability Mitigation in Cloud Environments | January 2023 | January 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18156863 | System and method for implementing token-based authentication of text messages | January 2023 | September 2025 | Allow | 31 | 2 | 0 | Yes | No |
| 18099117 | TOKENIZED STRUCTURED EXCHANGE TRACKING | January 2023 | October 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 18098147 | DATA EXCHANGE WITH RESOURCE CONSTRAINED TECHNOLOGY IN SURGICAL ENVIRONMENT | January 2023 | November 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 18149541 | SYSTEMS AND METHODS FOR DEVICE AUTHENTICATION USING AUTHENTICATION TOKENS DERIVED FROM QUANTUM PARTICLES | January 2023 | October 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 18075140 | Subscription and Key Management System | December 2022 | September 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 17989731 | CLOUD-DISTRIBUTED APPLICATION RUNTIME - AN EMERGING LAYER OF MULTI-CLOUD APPLICATION SERVICES FABRIC | November 2022 | July 2025 | Allow | 32 | 0 | 0 | Yes | No |
| 17986661 | PRIORITIZING ASSETS USING SECURITY METRICS | November 2022 | October 2024 | Allow | 23 | 2 | 0 | Yes | No |
| 18054362 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR GENERATION AND USE OF MOBILE LEGAL IDENTIFICATION DATA OBJECTS | November 2022 | August 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 18051167 | FABRIC-BASED ROOT-OF-TRUST | October 2022 | January 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 17971958 | CLOUD MANAGEMENT OF CONNECTIVITY FOR EDGE NETWORKING DEVICES | October 2022 | September 2023 | Allow | 11 | 0 | 0 | Yes | No |
| 17966805 | SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATION | October 2022 | August 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 17937622 | NETWORK SECURITY MANAGEMENT FOR A BUILDING AUTOMATION SYSTEM | October 2022 | August 2023 | Allow | 11 | 0 | 0 | Yes | No |
| 17956928 | MIXED NOISE MECHANISM FOR DATA ANONYMIZATION | September 2022 | March 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 17952243 | Distributed one-time-use entry code generation for physical access control method of operation and mobile systems | September 2022 | April 2025 | Allow | 31 | 1 | 0 | No | No |
| 17952245 | Distributed one-time-use entry code generation for physical access control method of operation and mobile systems | September 2022 | April 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17952241 | Distributed one-time-use entry code generation for physical access control method of operation and mobile systems | September 2022 | April 2025 | Abandon | 30 | 1 | 0 | No | No |
| 17952073 | SECURE TAMPER RESISTANT DATA PROCESSING, STORAGE, AND TRANSMISSION GATEWAY AND CONTROLLER AND DATA ANOMALY DETECTION PROGRAM | September 2022 | July 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17949796 | REAL-TIME PREVENTION OF MALICIOUS CONTENT VIA DYNAMIC ANALYSIS | September 2022 | April 2024 | Allow | 18 | 1 | 0 | No | No |
| 17943637 | Securely Rehydrating Containerized Agents | September 2022 | August 2024 | Allow | 23 | 0 | 0 | No | No |
| 17931606 | MODEM PROCESSOR FIREWALL OPERATIONS | September 2022 | December 2024 | Abandon | 27 | 1 | 0 | No | No |
| 17288236 | USER AUTHENTICATION SYSTEM, USER AUTHENTICATION SERVER, AND USER AUTHENTICATION METHOD | September 2022 | July 2024 | Allow | 38 | 0 | 0 | Yes | No |
| 17939385 | METHOD AND APPARATUS FOR CRYPTOGRAPHICALLY ALIGNING AND BINDING A SECURE ELEMENT WITH A HOST DEVICE | September 2022 | January 2024 | Allow | 16 | 1 | 0 | No | No |
| 17893124 | DYNAMIC IDENTITY ATTRIBUTION | August 2022 | June 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 17891179 | DECENTRALIZED EDGE NODE AUTHENTICATION | August 2022 | September 2024 | Allow | 25 | 0 | 0 | Yes | No |
| 17815727 | ACTIVE FINGERPRINTING FOR TRANSPORT LAYER SECURITY (TLS) SERVERS | July 2022 | April 2024 | Allow | 20 | 1 | 0 | No | No |
| 17814484 | REMOTE HARDWARE ACCESS SERVICE | July 2022 | August 2023 | Allow | 13 | 1 | 0 | No | No |
| 17869647 | PROCESSING AUTHENTICATION REQUESTS FOR UNIFIED ACCESS MANAGEMENT SYSTEMS AND APPLICATIONS USING FREQUENTLY INVOKED POLICIES | July 2022 | December 2025 | Allow | 40 | 1 | 0 | Yes | No |
| 17783240 | CUSTOMIZED ANOMALY DETECTION | June 2022 | October 2024 | Allow | 28 | 2 | 0 | Yes | No |
| 17831131 | COMPUTER-BASED SYSTEM FOR ANALYZING AND QUANTIFYING CYBER THREAT PATTERNS AND METHODS OF USE THEREOF | June 2022 | April 2023 | Allow | 11 | 0 | 0 | Yes | No |
| 17745476 | SYSTEMS AND METHODS FOR GRAPHICAL VISUALIZATION OF WEB APPLICATION VULNERABILITIES | May 2022 | February 2024 | Allow | 21 | 2 | 0 | Yes | No |
| 17662591 | MULTIPLE APPLICATION AUTHENTICATION | May 2022 | April 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17739364 | DATA PROCESSING SYSTEMS FOR ASSESSING READINESS FOR RESPONDING TO PRIVACY-RELATED INCIDENTS | May 2022 | May 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17755692 | PUBLIC KEY ENCRYPTION USING SELF POWERED TIMERS | May 2022 | October 2024 | Allow | 29 | 0 | 0 | Yes | No |
| 17733039 | CALLBACK WITH A PIGGYBACK FUNCTION TO SET UP SECURITY CONTEXT | April 2022 | September 2025 | Allow | 41 | 1 | 0 | Yes | No |
| 17709815 | PRESERVING CONFIDENTIALITY OF TENANTS IN CLOUD ENVIRONMENT WHEN DEPLOYING SECURITY SERVICES | March 2022 | February 2024 | Allow | 23 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner HAILU, TESHOME.
With a 35.1% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is above the USPTO average, indicating that appeals have better success here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 36.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
✓ Appeals to PTAB show good success rates. If you have a strong case on the merits, consider fully prosecuting the appeal to a Board decision.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner HAILU, TESHOME works in Art Unit 2434 and has examined 805 patent applications in our dataset. With an allowance rate of 82.0%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 30 months.
Examiner HAILU, TESHOME's allowance rate of 82.0% places them in the 54% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by HAILU, TESHOME receive 1.86 office actions before reaching final disposition. This places the examiner in the 44% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by HAILU, TESHOME is 30 months. This places the examiner in the 59% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +23.0% benefit to allowance rate for applications examined by HAILU, TESHOME. This interview benefit is in the 69% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 30.2% of applications are subsequently allowed. This success rate is in the 59% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 20.7% of cases where such amendments are filed. This entry rate is in the 26% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 42.9% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 39% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 61.5% of appeals filed. This is in the 39% percentile among all examiners. Of these withdrawals, 37.3% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 49.6% are granted (fully or in part). This grant rate is in the 46% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 1.7% of allowed cases (in the 73% percentile). This examiner makes examiner's amendments more often than average to place applications in condition for allowance (MPEP § 1302.04).
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.