Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18669396 | METHOD AND SYSTEM FOR GENERATING STATEFUL ATTACKS | May 2024 | April 2025 | Allow | 11 | 1 | 0 | No | No |
| 18668279 | PARTIAL LIMITATION OF A MOBILE NETWORK DEVICE | May 2024 | April 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18400166 | MODEL RUNNING METHODS AND APPARATUSES | December 2023 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18544890 | RISK BASED REMOTE BROWSER ISOLATION | December 2023 | June 2025 | Allow | 18 | 0 | 0 | No | No |
| 18572069 | BROADCAST ENCRYPTION WITH IMPROVED RESOURCE UTILIZATION | December 2023 | June 2025 | Allow | 18 | 0 | 0 | Yes | No |
| 18542473 | TRANSPORTATION SECURITY APPARATUS, SYSTEM, AND METHOD TO ANALYZE IMAGES TO DETECT A THREAT CONDITION | December 2023 | May 2025 | Allow | 17 | 2 | 0 | No | No |
| 18519555 | SYSTEMS AND METHODS FOR LINK DEVICE AUTHENTICATION | November 2023 | March 2025 | Allow | 16 | 1 | 0 | Yes | No |
| 18520061 | ARTIFICIAL-INTELLIGENCE-ASSISTED CERTIFICATION SYSTEM | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18510894 | DATA PROCESSING SYSTEM WITH SECURE MEMORY SHARING | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18487428 | DISTRIBUTED TRAINING USING ACTOR-CRITIC REINFORCEMENT LEARNING WITH OFF-POLICY CORRECTION FACTORS | October 2023 | January 2025 | Allow | 15 | 0 | 0 | No | No |
| 18284429 | ATTESTATION-AS-A-SERVICE FOR CONFIDENTIAL COMPUTING | September 2023 | May 2025 | Allow | 19 | 0 | 0 | No | No |
| 18283325 | SECURE WORKFLOWS THAT ENHANCE DATA SECURITY | September 2023 | May 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18226161 | PATTERN MATCH-BASED DETECTION IN IOT SECURITY | July 2023 | March 2025 | Allow | 20 | 2 | 0 | Yes | No |
| 18225517 | LEARNING OF MALICIOUS BEHAVIOR VOCABULARY AND THREAT DETECTION THROUGH BEHAVIOR MATCHING | July 2023 | June 2024 | Allow | 11 | 1 | 0 | No | No |
| 18353378 | METHODS AND SYSTEMS FOR PROCESSING DATA OF AN ANALYTICAL INSTRUMENT FOR ANALYZING BIOLOGICAL SAMPLES | July 2023 | March 2025 | Allow | 20 | 2 | 0 | No | No |
| 18352036 | SECURE NEIGHBORHOODS ASSESSMENT IN ENTERPRISE NETWORKS | July 2023 | April 2025 | Allow | 21 | 3 | 0 | No | No |
| 18260793 | METHOD FOR SECURING A MULTIPLE POINT MULTIPLICATION OPERATION AGAINST SIDE-CHANNEL ATTACKS | July 2023 | April 2025 | Allow | 21 | 0 | 0 | No | No |
| 18337785 | System and Method for Cybersecurity Threat Monitoring Using Dynamically-Updated Semantic Graphs | June 2023 | April 2024 | Allow | 10 | 1 | 0 | No | No |
| 18210985 | SYSTEMS AND METHODS FOR ACCELERATED DETECTION AND REPLACEMENT OF ANOMALOUS MACHINE LEARNING-BASED ENSEMBLES AND INTELLIGENT GENERATION OF ANOMALOUS ARTIFACTS FOR ANOMALOUS ENSEMBLES | June 2023 | October 2023 | Allow | 4 | 1 | 0 | No | No |
| 18208204 | SAMPLE TRAFFIC BASED SELF-LEARNING MALWARE DETECTION | June 2023 | April 2024 | Allow | 10 | 1 | 0 | No | No |
| 18204171 | IDENTIFYING APPLICATIONS USING IMAGES GENERATED FROM NETWORK PACKETS | May 2023 | May 2024 | Allow | 11 | 1 | 0 | No | No |
| 18201108 | ELECTRONIC INTERACTION AUTHENTICATION AND VERIFICATION, AND RELATED SYSTEMS, DEVICES, AND METHODS | May 2023 | March 2024 | Allow | 10 | 0 | 0 | No | No |
| 18200382 | TENANT-AWARE DISTRIBUTED APPLICATION AUTHENTICATION | May 2023 | October 2024 | Allow | 16 | 2 | 0 | No | No |
| 18143943 | AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND AUTHENTICATION PROGRAM | May 2023 | June 2025 | Allow | 25 | 1 | 0 | No | No |
| 18138995 | APPARATUS FOR GENERATING AN ACTION-BASED COLLECTIVE | April 2023 | September 2024 | Abandon | 17 | 1 | 0 | No | No |
| 18133285 | SYSTEMS AND METHODS FOR INTELLIGENT CYBER SECURITY THREAT DETECTION AND MITIGATION THROUGH AN EXTENSIBLE AUTOMATED INVESTIGATIONS AND THREAT MITIGATION PLATFORM | April 2023 | June 2024 | Allow | 14 | 1 | 0 | No | No |
| 18193385 | APPARATUS AND METHOD FOR E-MAIL BASED DIGITAL FOOTPRINT SANITIZATION | March 2023 | July 2023 | Allow | 4 | 1 | 0 | No | No |
| 18179376 | Data Breach Detection and Mitigation | March 2023 | March 2024 | Allow | 12 | 1 | 0 | No | No |
| 18111478 | MANAGEMENT OF COLLABORATIVE CONTENT ITEM MODIFICATION | February 2023 | September 2023 | Allow | 7 | 0 | 0 | No | No |
| 18097117 | SYSTEMS AND METHODS OF DETERMINING COMPROMISED IDENTITY INFORMATION | January 2023 | November 2023 | Allow | 10 | 1 | 0 | No | No |
| 18093486 | AUTOMATED AND ADAPTIVE MODEL-DRIVEN SECURITY SYSTEM AND METHOD FOR OPERATING THE SAME | January 2023 | February 2025 | Allow | 25 | 0 | 0 | No | No |
| 18149771 | DISTRIBUTED TRAINING USING ACTOR-CRITIC REINFORCEMENT LEARNING WITH OFF-POLICY CORRECTION FACTORS | January 2023 | July 2023 | Allow | 6 | 0 | 0 | No | No |
| 18147291 | COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR RECOVERING DATA IN CASE OF A COMPUTER NETWORK FAILURE | December 2022 | December 2023 | Allow | 12 | 1 | 0 | No | No |
| 18147468 | MALWARE DETECTION AND CONTENT ITEM RECOVERY | December 2022 | March 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18145184 | Automatic Transaction Processing Failover | December 2022 | January 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18086349 | SYSTEMS AND METHODS FOR ALLOWING A USER TO DOWNLOAD A BLOCKED MEDIA ASSET | December 2022 | July 2024 | Allow | 19 | 4 | 0 | Yes | No |
| 17981169 | ENCRYPTION KEY MANAGEMENT FOR INTERNATIONAL DATA RESIDENCY | November 2022 | May 2023 | Allow | 6 | 0 | 0 | No | No |
| 17963365 | SYSTEMS AND METHODS FOR ACCELERATED DETECTION AND REPLACEMENT OF ANOMALOUS MACHINE LEARNING-BASED DIGITAL THREAT SCORING ENSEMBLES AND INTELLIGENT GENERATION OF ANOMALOUS ARTIFACTS FOR ANOMALOUS ENSEMBLES | October 2022 | March 2023 | Allow | 5 | 0 | 0 | No | No |
| 17955465 | COMPUTER-IMPLEMENTED METHOD AND ARRANGEMENT FOR CLASSIFYING ANOMALIES | September 2022 | September 2023 | Allow | 11 | 1 | 0 | No | No |
| 17885092 | DATA MODEL TO ORGANIZE, GENERATE, AND SHARE DATA ABOUT AN OBJECT WITH MULTIPLE MEDIA FORMATS VIA VARIOUS PRESENTATION SYSTEMS | August 2022 | July 2023 | Allow | 11 | 2 | 0 | Yes | No |
| 17877888 | MULTI-TENANCY VIA CODE ENCAPSULATED IN SERVER REQUESTS | July 2022 | June 2023 | Allow | 10 | 2 | 0 | No | No |
| 17877811 | SAMPLE TRAFFIC BASED SELF-LEARNING MALWARE DETECTION | July 2022 | March 2023 | Allow | 7 | 1 | 0 | No | No |
| 17872996 | APPARATUS FOR GENERATING AN ACTION-BASED COLLECTIVE | July 2022 | January 2023 | Allow | 6 | 0 | 0 | Yes | No |
| 17867975 | METHODS AND SYSTEMS FOR ACCESS CONTROL IN A COMPUTING SYSTEM | July 2022 | February 2025 | Allow | 31 | 1 | 0 | No | No |
| 17867572 | System on Chip with Pre-Exemption Interrupts for Partition Execution Control | July 2022 | October 2024 | Allow | 27 | 1 | 0 | No | No |
| 17865154 | RANDOMIZATION OF ENCRYPTION OF FILE BLOCKS | July 2022 | March 2025 | Abandon | 32 | 1 | 0 | No | No |
| 17864878 | INTERACTIVE ACCESS TO HEADLESS CLUSTER MANAGERS | July 2022 | February 2025 | Allow | 31 | 1 | 0 | Yes | No |
| 17864940 | SYSTEM FOR ESTABLISHING SECURE COMMUNICATION CHANNELS FOR PERIPHERAL HARDWARE DEVICES | July 2022 | August 2024 | Allow | 25 | 0 | 0 | Yes | No |
| 17861445 | METHODS FOR PROTECTING COMPUTER HARDWARE FROM CYBER THREATS | July 2022 | July 2024 | Allow | 24 | 0 | 1 | Yes | No |
| 17848629 | SECURITY CONTROL FOR ELECTRONIC CONTROL UNIT | June 2022 | February 2024 | Allow | 20 | 0 | 0 | Yes | No |
| 17846281 | AUTHENTICATION USING MAGNETIC FIELD BASED ON CURRENT DRAWN BY SECURITY DEVICE | June 2022 | September 2024 | Allow | 27 | 1 | 0 | No | No |
| 17846363 | SECURE PROCESSOR, OPERATING METHOD THEREOF, AND STORAGE DEVICE INCLUDING SAME | June 2022 | March 2024 | Allow | 21 | 0 | 0 | No | No |
| 17845383 | PROCESSING ANOMALY DATA TO IDENTIFY NETWORK SECURITY THREATS BY USE OF RARITY ANALYSIS | June 2022 | July 2023 | Allow | 12 | 0 | 0 | No | No |
| 17838051 | SYSTEMS AND METHODS FOR AN ADAPTIVE SAMPLING OF UNLABELED DATA SAMPLES FOR CONSTRUCTING AN INFORMATIVE TRAINING DATA CORPUS THAT IMPROVES A TRAINING AND PREDICTIVE ACCURACY OF A MACHINE LEARNING MODEL | June 2022 | August 2022 | Allow | 2 | 0 | 0 | No | No |
| 17836892 | Logical Validation of Devices Against Fraud and Tampering | June 2022 | November 2024 | Allow | 30 | 2 | 0 | Yes | No |
| 17831606 | PIXEL STREAMED NFT-BASED LIVING ARTWORK AND QUEUE-BASED LIVE EVENT VIEWING | June 2022 | November 2022 | Allow | 6 | 1 | 0 | No | No |
| 17749386 | APPARATUS AND METHOD FOR PROVIDING SECURE EXECUTION ENVIRONMENT FOR NPU | May 2022 | March 2024 | Allow | 22 | 0 | 0 | No | No |
| 17744507 | TRANSPORTATION SECURITY APPARATUS, SYSTEM, AND METHOD TO ANALYZE IMAGES TO DETECT A THREAT CONDITION | May 2022 | August 2023 | Allow | 15 | 1 | 0 | No | No |
| 17742643 | SYSTEMS AND METHODS FOR ALLOWING A USER TO ACCESS BLOCKED MEDIA | May 2022 | January 2024 | Allow | 20 | 2 | 0 | No | No |
| 17724954 | LABELING METHOD, APPARATUS, AND DEVICE, AND READABLE STORAGE MEDIUM | April 2022 | April 2024 | Allow | 23 | 0 | 0 | No | No |
| 17722294 | APPLICATION ACCESS LOGGER | April 2022 | August 2024 | Allow | 28 | 1 | 0 | No | No |
| 17716030 | Machine Learning Methods And Systems For Developing Security Governance Recommendations | April 2022 | June 2023 | Allow | 15 | 3 | 0 | Yes | No |
| 17714427 | UNIQUE TOKEN AUTHENTICATION VERIFICATION VALUE | April 2022 | August 2024 | Allow | 28 | 2 | 0 | Yes | No |
| 17709201 | WIRELESS SHARED OMNIBUS ACCESS CONTROL METHOD AND SYSTEM | March 2022 | April 2024 | Allow | 24 | 0 | 0 | No | No |
| 17707482 | SYSTEM AND METHOD FOR AUTONOMOUS SOFTWARE LICENSING DURING BOOTUP PROCESS | March 2022 | April 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17683236 | SHARING AUTHENTICATION BETWEEN APPLICATIONS | February 2022 | February 2023 | Allow | 12 | 0 | 0 | No | No |
| 17680807 | System and Method for Digital Imaging and Communications in Security Standard Compliance Validation | February 2022 | April 2024 | Allow | 25 | 0 | 0 | No | No |
| 17638694 | USING SECURE ENCLAVES AND DYNAMIC MEASUREMENTS | February 2022 | May 2024 | Allow | 26 | 1 | 0 | No | No |
| 17677169 | DYNAMIC DISPLAY CONTROL APPLICATION FOR CONTROLLING GRAPHICAL USER INTERFACE ELEMENTS BASED ON ACTIVITY DATA | February 2022 | August 2023 | Abandon | 18 | 1 | 0 | No | No |
| 17676797 | ARTIFICIAL INTELLIGENCE-BASED GENERATION OF ANTHROPOMORPHIC SIGNATURES AND USE THEREOF | February 2022 | June 2023 | Allow | 16 | 1 | 0 | Yes | No |
| 17676183 | METHOD AND SYSTEM FOR GENERATING STATEFUL ATTACKS | February 2022 | January 2024 | Allow | 23 | 1 | 0 | No | No |
| 17672140 | SYSTEMS AND METHODS FOR INTELLIGENT CYBER SECURITY THREAT DETECTION AND MITIGATION THROUGH AN EXTENSIBLE AUTOMATED INVESTIGATIONS AND THREAT MITIGATION PLATFORM | February 2022 | February 2023 | Allow | 12 | 2 | 0 | No | No |
| 17668965 | CYPHERGENICS-BASED DECODING AND ENCODING OF PROGRAM DATA | February 2022 | June 2022 | Allow | 4 | 0 | 0 | No | No |
| 17665826 | METHODS AND DEVICES FOR SECURE APPLICATION AUTHENTICATION USING A ONE-WAY ENCRYPTED AUTHENTICATION TOKEN | February 2022 | September 2024 | Allow | 31 | 2 | 0 | Yes | No |
| 17555125 | POLICY DRIVEN VULNERABILITY IDENTIFICATION AND REMEDIATION | December 2021 | October 2024 | Allow | 34 | 1 | 0 | No | No |
| 17551558 | PROTECTING SOFTWARE SUPPLY CHAIN USING SECURE LOG GENERATED IN A TRUSTED BUILD ENVIRONMENT | December 2021 | October 2024 | Allow | 34 | 2 | 0 | No | No |
| 17551076 | COMPUTER-BASED PLATFORMS OR SYSTEMS, COMPUTING DEVICES OR COMPONENTS AND/OR COMPUTING METHODS FOR TECHNOLOGICAL APPLICATIONS INVOLVING PROVISION OF A PORTAL FOR MANAGING USER ACCOUNTS HAVING A LOGIN PORTAL CONFIGURED TO DEFEND AGAINST CREDENTIAL REPLAY ATTACKS | December 2021 | January 2023 | Allow | 13 | 1 | 0 | No | No |
| 17549147 | SYSTEM AND METHOD FOR CYBERSECURITY THREAT MONITORING USING DYNAMICALLY-UPDATED SEMANTIC GRAPHS | December 2021 | March 2023 | Allow | 15 | 1 | 0 | No | No |
| 17548776 | METHOD AND SYSTEM WITH MULTIPLE HETEROGENEOUS TEE IMPLEMENTATIONS | December 2021 | January 2024 | Allow | 25 | 1 | 0 | No | No |
| 17546800 | PIXEL STREAMED NFT-BASED LIVING ARTWORK AND QUEUE-BASED LIVE EVENT VIEWING | December 2021 | June 2022 | Allow | 6 | 2 | 0 | Yes | No |
| 17547084 | ACHIEVING MINIMUM TRUSTWORTHINESS IN DISTRIBUTED WORKLOADS | December 2021 | August 2023 | Allow | 20 | 0 | 0 | Yes | No |
| 17539334 | Methods and Systems for Implementing Automated Controls Assessment in Computer Systems | December 2021 | March 2023 | Allow | 15 | 1 | 0 | No | No |
| 17610423 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM | November 2021 | October 2023 | Allow | 23 | 0 | 0 | No | No |
| 17516247 | TRUSTED EXECUTION BROKER | November 2021 | December 2023 | Allow | 25 | 1 | 0 | Yes | No |
| 17512919 | PROTECTION METHOD, COMPUTER PROGRAM PRODUCT AND ASSOCIATED SYSTEMS | October 2021 | September 2024 | Allow | 34 | 2 | 0 | No | No |
| 17506607 | INTRUSION DETECTION METHOD AND SYSTEM FOR INTERNET OF VEHICLES BASED ON SPARK AND COMBINED DEEP LEARNING | October 2021 | June 2022 | Allow | 8 | 0 | 0 | Yes | No |
| 17499379 | NETWORKING DATA ANALYSIS IN A VISUAL SPREADSHEET | October 2021 | April 2022 | Allow | 6 | 0 | 0 | No | No |
| 17494960 | SYSTEMS AND METHODS FOR LINK DEVICE AUTHENTICATION | October 2021 | August 2023 | Allow | 22 | 1 | 0 | Yes | No |
| 17489913 | SYSTEMS AND METHODS FOR TRAFFIC MONITORING WITH IMPROVED PRIVACY PROTECTIONS | September 2021 | January 2024 | Allow | 27 | 1 | 0 | No | No |
| 17488800 | SYSTEMS AND METHODS FOR INTELLIGENT CYBER SECURITY THREAT DETECTION AND MITIGATION THROUGH AN EXTENSIBLE AUTOMATED INVESTIGATIONS AND THREAT MITIGATION PLATFORM | September 2021 | January 2022 | Allow | 4 | 0 | 0 | Yes | No |
| 17449343 | Secure Public Cloud with Protected Guest-Verified Host Control | September 2021 | June 2023 | Allow | 21 | 2 | 0 | No | No |
| 17488614 | RAPID IDENTIFICATION OF MESSAGE AUTHENTICATION | September 2021 | January 2024 | Allow | 27 | 1 | 0 | No | No |
| 17487827 | DYNAMIC DISPLAY CONTROL APPLICATION FOR CONTROLLING GRAPHICAL USER INTERFACE ELEMENTS BASED ON ACTIVITY DATA | September 2021 | December 2021 | Allow | 3 | 0 | 0 | No | No |
| 17486483 | Automatic In-Store Subscriber Device Detection and Processing | September 2021 | October 2023 | Allow | 24 | 0 | 0 | No | No |
| 17482154 | IDENTIFYING NETWORK APPLICATIONS USING IMAGES GENERATED FROM PAYLOAD DATA AND TIME DATA | September 2021 | February 2023 | Allow | 17 | 1 | 0 | No | No |
| 17481898 | Graphical User Interface and Operator Console Management System for Distributed Terminal Network | September 2021 | August 2022 | Abandon | 11 | 1 | 0 | No | No |
| 17480052 | IMPLEMENTING HIERARCHICAL CYBERSECURITY SYSTEMS AND METHODS | September 2021 | February 2023 | Allow | 17 | 1 | 0 | No | No |
| 17472244 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR COMPARING IMAGES | September 2021 | March 2024 | Abandon | 30 | 1 | 0 | No | No |
| 17466718 | TRACKING OF USER LOGIN SESSIONS | September 2021 | March 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17310927 | METHOD OF BLOCKING ACCESS OF THREATENING USER AND PROGRAM SECURITY APPLICATION METHOD | August 2021 | August 2024 | Allow | 35 | 1 | 1 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner DADA, BEEMNET W.
With a 31.2% reversal rate, the PTAB reverses the examiner's rejections in a meaningful percentage of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 32.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner DADA, BEEMNET W works in Art Unit 2435 and has examined 1,066 patent applications in our dataset. With an allowance rate of 87.6%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 25 months.
Examiner DADA, BEEMNET W's allowance rate of 87.6% places them in the 63% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by DADA, BEEMNET W receive 1.48 office actions before reaching final disposition. This places the examiner in the 35% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by DADA, BEEMNET W is 25 months. This places the examiner in the 66% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +15.4% benefit to allowance rate for applications examined by DADA, BEEMNET W. This interview benefit is in the 59% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 33.1% of applications are subsequently allowed. This success rate is in the 64% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 40.5% of cases where such amendments are filed. This entry rate is in the 54% percentile among all examiners. Strategic Recommendation: This examiner shows above-average receptiveness to after-final amendments. If your amendments clearly overcome the rejections and do not raise new issues, consider filing after-final amendments before resorting to an RCE.
When applicants request a pre-appeal conference (PAC) with this examiner, 80.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 60% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 65.2% of appeals filed. This is in the 40% percentile among all examiners. Of these withdrawals, 41.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 35.2% are granted (fully or in part). This grant rate is in the 30% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 3.2% of allowed cases (in the 84% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 15% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.