Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19272214 | CRYPTOGRAPHIC INTEGRITY VERIFICATION AND ADAPTIVE ARTIFICIAL INTELLIGENCE DOCUMENT EXTRACTOR SYSTEM FOR WORKFLOW AUTOMATION IN VARIOUS DOMAINS | July 2025 | September 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19208115 | SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY PREDICTING DEVICE TYPES FOR SCANNED DEVICES ON A NETWORK | May 2025 | June 2025 | Allow | 1 | 0 | 0 | Yes | No |
| 18869189 | TECHNIQUES FOR ANONYMIZING USER ACTIVITY | November 2024 | March 2026 | Allow | 15 | 0 | 0 | No | No |
| 18818320 | SYSTEMS AND METHODS CONFIGURED FOR AUTOMATICALLY PREDICTING DEVICE TYPES FOR SCANNED DEVICES ON A NETWORK | August 2024 | March 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18667871 | SYSTEMS AND METHODS FOR NETWORK-BASED UE SERVICE AUTHORIZATION | May 2024 | January 2026 | Allow | 20 | 1 | 0 | Yes | No |
| 18440780 | OPENROAMING AUGMENTATION METHOD FOR EAP FAILURES | February 2024 | April 2025 | Allow | 14 | 1 | 0 | Yes | No |
| 18403339 | Pure Differentially Private Algorithms for Summation in the Shuffled Model | January 2024 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18401500 | APPARATUS, SYSTEM AND METHOD FOR PATIENT-AUTHORIZED SECURE AND TIME-LIMITED ACCESS TO PATIENT MEDICAL RECORDS UTILIZING KEY ENCRYPTION | December 2023 | August 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18381975 | ENCRYPTED END-TO-END MESSAGING USING NEAR-FIELD COMMUNICATION (NFC) TAGS | October 2023 | February 2026 | Allow | 28 | 1 | 0 | No | No |
| 18553926 | METHOD AND SYSTEM FOR SECURE FILE SHARING BASED ON DOMESTIC CRYPTOGRAPHIC ALGORITHM | October 2023 | September 2025 | Allow | 24 | 0 | 0 | Yes | No |
| 18476749 | DOUBLE BLIND PRIVATE WIRELESS LOCAL AREA NETWORKING | September 2023 | January 2026 | Allow | 28 | 1 | 0 | Yes | No |
| 18467329 | SYSTEMS AND METHODS FOR LEDGER-BASED COOKIE MANAGEMENT | September 2023 | September 2025 | Allow | 24 | 1 | 0 | Yes | No |
| 18448235 | Security Negotiation Method and Apparatus | August 2023 | December 2025 | Allow | 28 | 2 | 0 | Yes | No |
| 18361811 | HOST - LEVEL TICKET FORGERY DETECTION AND EXTENSION TO NETWORK ENDPOINTS | July 2023 | September 2025 | Allow | 25 | 1 | 0 | No | No |
| 18358345 | MINIMIZING TRAFFIC DROP WHEN REKEYING IN A DISTRIBUTED SECURITY GROUP | July 2023 | August 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18357194 | REMOVING INTERACTIONS FROM A VIRTUAL ENVIRONMENT | July 2023 | July 2025 | Allow | 24 | 1 | 0 | Yes | No |
| 18225199 | METHOD AND DEVICE TO ESTABLISH A WIRELESS SECURE LINK WHILE MAINTAINING PRIVACY AGAINST TRACKING | July 2023 | November 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18324496 | Identity on a Network | May 2023 | October 2025 | Abandon | 29 | 1 | 0 | No | No |
| 18137459 | Enhanced Security with Multiple Factor Authentication at Devices Using Partitions | April 2023 | May 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18193007 | SECURE COMMUNICATION METHOD, APPARATUS, AND SYSTEM | March 2023 | January 2026 | Abandon | 34 | 2 | 0 | No | No |
| 18122814 | SECURITY SOLUTION FOR SWITCHING ON AND OFF SECURITY FOR UP DATA BETWEEN UE AND RAN IN 5G | March 2023 | January 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18180341 | SYSTEM AND METHOD FOR SECURE CONNECTION OF HEADLESS BLUETOOTH DEVICE | March 2023 | May 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18110190 | MULTI-OBJECTIVE COMPUTER INFRASTRUCTURE VULNERABILITY PRIORITIZATION | February 2023 | October 2025 | Allow | 32 | 2 | 0 | Yes | No |
| 18167848 | ARTIFICIAL-INTELLIGENCE-BASED SYSTEM AND METHOD FOR QUESTIONNAIRE / SECURITY POLICY CROSS-CORRELATION AND COMPLIANCE LEVEL ESTIMATION FOR CYBER RISK ASSESSMENTS | February 2023 | June 2025 | Abandon | 28 | 1 | 0 | No | No |
| 18101837 | TECHNIQUES FOR FACILITATING PRIVACY AND PROTECTION IN METAVERSES | January 2023 | April 2025 | Allow | 27 | 1 | 0 | Yes | No |
| 18099565 | SYSTEMS AND METHODS FOR DYNAMIC ACCESS PERMISSIONS TO SECURE DATA RESOURCES IN A DISTRIBUTED NETWORK | January 2023 | October 2025 | Allow | 33 | 2 | 0 | No | No |
| 18155486 | MACHINE LEARNING-BASED MALICIOUS ATTACHMENT DETECTOR | January 2023 | September 2024 | Allow | 20 | 1 | 0 | Yes | No |
| 18097311 | METHOD AND SYSTEM FOR SECURE DISTRIBUTION OF SYMMETRIC ENCRYPTION KEYS USING QUANTUM KEY DISTRIBUTION (QKD) | January 2023 | March 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18154501 | SELECTIVITY IN PRIVACY AND VERIFICATION WITH APPLICATIONS | January 2023 | December 2024 | Allow | 23 | 1 | 0 | No | No |
| 18092690 | METHOD AND DEVICE FOR SELECTIVE USER PLANE SECURITY IN WIRELESS COMMUNICATION SYSTEM | January 2023 | May 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 18087189 | AIOPS GUIDED, QUANTUM-SAFE ZERO TRUST DATA TRANSFER METHODS IN-MOTION WITH SEGMENTED, DATA TRANSFER ACROSS AN OVERLAY NETWORK | December 2022 | October 2024 | Allow | 22 | 0 | 0 | Yes | No |
| 18086116 | DYNAMIC CROSS-STANDARD COMPLIANCE COVERAGE | December 2022 | June 2025 | Allow | 30 | 2 | 0 | Yes | No |
| 18079396 | SECURITY POLICY COMPLIANCE VERIFICATION AND CERTIFICATION AS A SERVICE LEVERAGING SYSTEMS PROVIDING ACCESS MANAGEMENT AS A SERVICE | December 2022 | September 2024 | Allow | 21 | 0 | 0 | Yes | No |
| 18061195 | PHISHING DATA ITEM CLUSTERING AND ANALYSIS | December 2022 | September 2023 | Allow | 10 | 0 | 0 | Yes | No |
| 17989269 | SYSTEMS AND METHODS FOR FACILITATING CRYPTOGRAPHIC ATTESTATION CHAINS USING BONDED ORACLES | November 2022 | September 2024 | Allow | 22 | 0 | 0 | No | No |
| 17988184 | Identity power scoring system for cloud environments | November 2022 | January 2026 | Allow | 38 | 3 | 0 | No | No |
| 17987425 | MACHINE LEARNING-ENABLED CHARACTER BASED ENCRYPTION SYSTEM | November 2022 | August 2024 | Allow | 21 | 0 | 0 | No | No |
| 17974422 | CONTINUOUS ENCRYPTION FUNCTIONS FOR SECURITY OVER NETWORKS | October 2022 | February 2025 | Abandon | 28 | 1 | 0 | No | No |
| 18049007 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY RECORDING MEDIUM | October 2022 | March 2025 | Allow | 28 | 2 | 0 | Yes | No |
| 17971285 | MULTI-LAYERED SECURE EQUIPMENT ACCESS | October 2022 | September 2025 | Allow | 35 | 2 | 0 | Yes | No |
| 17966226 | METHOD FOR SECURING PRIVATE STRUCTURED DATABASES WITHIN A PUBLIC BLOCKCHAIN | October 2022 | April 2025 | Allow | 30 | 1 | 0 | Yes | No |
| 17918550 | ID CARD AND METHOD FOR MANUFACTURING SAME, ID CARD ISSUING DEVICE AND SYSTEM, AND FACE AUTHENTICATION DEVICE AND SYSTEM | October 2022 | February 2025 | Abandon | 28 | 1 | 0 | No | No |
| 17900263 | SYSTEM AND METHOD FOR ASSESSMENT OF PRIVACY EXPOSURE AND COMPUTING RISK INDEX FOR ONLINE SERVICE | August 2022 | February 2025 | Allow | 29 | 1 | 0 | No | No |
| 17799898 | METHOD OF COMMUNICATION BETWEEN FUNCTIONAL BLOCKS IN A SYSTEM-ON-CHIP AND SYSTEM-ON-CHIP THEREOF | August 2022 | November 2024 | Allow | 27 | 1 | 0 | No | No |
| 17873080 | SYSTEMS AND METHODS OF GROUP SIGNATURE MANAGEMENT WITH CONSENSUS | July 2022 | February 2024 | Allow | 19 | 1 | 0 | Yes | No |
| 17869641 | PROCESSING AUTHENTICATION REQUESTS FOR UNIFIED ACCESS MANAGEMENT SYSTEMS AND APPLICATIONS | July 2022 | July 2024 | Allow | 24 | 0 | 0 | No | No |
| 17793880 | CYPHER SYSTEM, ENCRYPTION METHOD, DECRYPTION METHOD AND PROGRAM | July 2022 | September 2025 | Abandon | 38 | 2 | 0 | No | No |
| 17740608 | USER-AUTHORIZED ONBOARDING USING A PUBLIC AUTHORIZATION SERVICE | May 2022 | July 2023 | Allow | 14 | 1 | 0 | No | No |
| 17731232 | MANAGED FORWARDING ELEMENT DETECTING INVALID PACKET ADDRESSES | April 2022 | January 2025 | Abandon | 32 | 1 | 0 | No | No |
| 17708250 | APPLYING DEVICE POLICIES USING A MANAGEMENT TOKEN | March 2022 | July 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17657106 | MESSAGE VERIFICATION OPTIMIZATION | March 2022 | December 2024 | Abandon | 32 | 1 | 0 | No | No |
| 17642647 | MULTI-MESSAGE MULTI-USER SIGNATURE AGGREGATION | March 2022 | June 2023 | Abandon | 16 | 1 | 0 | No | No |
| 17673841 | CONTEXT-AWARE SERVICE QUERY FILTERING | February 2022 | July 2024 | Allow | 29 | 1 | 0 | No | No |
| 17673310 | CLIENT-DRIVEN RANDOMIZED AND CHANGING MEDIA ACCESS CONTROL (MAC) ADDRESS (RCM) MECHANISM | February 2022 | August 2024 | Allow | 29 | 3 | 0 | Yes | No |
| 17669202 | DISTRIBUTED MACHINE LEARNING VIA SECURE MULTI-PARTY COMPUTATION AND ENSEMBLE LEARNING | February 2022 | August 2023 | Allow | 19 | 1 | 0 | Yes | No |
| 17666801 | DISTRIBUTED MACHINE LEARNING VIA SECURE MULTI-PARTY COMPUTATION AND ENSEMBLE LEARNING | February 2022 | August 2023 | Allow | 18 | 1 | 0 | Yes | No |
| 17591116 | SECURE REPORTING OF PLATFORM STATE INFORMATION TO A REMOTE SERVER | February 2022 | April 2023 | Allow | 15 | 0 | 0 | Yes | No |
| 17580152 | BLOCKCHAIN-BASED DIGITAL RIGHTS MANAGEMENT | January 2022 | July 2023 | Allow | 17 | 1 | 0 | Yes | No |
| 17575267 | SECURE COMMUNICATION IN ACCESSING A NETWORK | January 2022 | January 2024 | Allow | 24 | 2 | 0 | Yes | No |
| 17549313 | WEB THREAT INVESTIGATION USING ADVANCED WEB CRAWLING | December 2021 | June 2025 | Allow | 42 | 5 | 0 | Yes | No |
| 17643246 | FORWARDING NETWORK TRAFFIC ASSOCIATED WITH A SECURITY CLASSIFICATION VIA A ROUTING PATH ASSOCIATED WITH THE SECURITY CLASSIFICATION | December 2021 | December 2023 | Allow | 24 | 1 | 0 | Yes | No |
| 17457642 | CLOUD-BASED SECURITY SERVICE FOR IMPROVED COMPLIANCE OF MAINFRAME WORKLOADS | December 2021 | November 2023 | Allow | 23 | 1 | 0 | Yes | No |
| 17607069 | USER PLANE INTEGRITY PROTECTION IN 4G SYSTEM | October 2021 | February 2024 | Allow | 27 | 1 | 0 | No | No |
| 17507735 | EXPEDITED AUTHORIZATION AND CONNECTIVITY OF CLIENT DEVICES | October 2021 | July 2024 | Allow | 33 | 1 | 0 | Yes | No |
| 17501686 | DOCKING METHOD AND A SYSTEM THEREOF TO AVOID SIDE-CHANNEL ATTACKS | October 2021 | April 2024 | Allow | 30 | 0 | 0 | Yes | No |
| 17492051 | SYSTEMS AND METHODS FOR UE-INITIATED NSSAA PROCEDURES | October 2021 | July 2024 | Allow | 34 | 3 | 0 | No | No |
| 17449564 | ONE-OF-A-KIND TO OPEN EDITION NON-FUNGIBLE TOKEN DYNAMICS | September 2021 | December 2024 | Allow | 39 | 3 | 0 | No | No |
| 17490137 | CONTAINER NETWORK INTERFACE FOR APPLYING SECURITY POLICIES TO NETWORK TRAFFIC OF CONTAINERS | September 2021 | December 2024 | Allow | 38 | 1 | 0 | No | No |
| 17474033 | SELECTIVE NETWORK ACCESS BASED ON TRUST LEVEL | September 2021 | March 2024 | Allow | 30 | 2 | 0 | Yes | No |
| 17446860 | SIM SWAP FRAUD PREVENTION | September 2021 | October 2023 | Allow | 25 | 2 | 0 | Yes | No |
| 17409648 | MACHINE LEARNING-BASED MALICIOUS ATTACHMENT DETECTOR | August 2021 | October 2024 | Allow | 38 | 1 | 0 | Yes | No |
| 17403213 | IoT MALWARE CLASSIFICATION AT A NETWORK DEVICE | August 2021 | July 2024 | Allow | 35 | 2 | 0 | Yes | No |
| 17428663 | METHOD FOR CONTROLLING AN ACCESS DEVICE AND AN ACCESS SYSTEM | August 2021 | May 2025 | Abandon | 45 | 3 | 0 | No | No |
| 17389708 | SECURE FRAME ENCRYPTION AS A SERVICE | July 2021 | March 2024 | Allow | 32 | 3 | 0 | Yes | No |
| 17388267 | OPENROAMING AUGMENTATION METHOD FOR EAP FAILURES | July 2021 | November 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17386325 | METHOD AND APPARATUS FOR ACQUISITION OF RELIABLE TIME IN A WIRELESS NETWORK | July 2021 | September 2024 | Allow | 37 | 3 | 0 | Yes | No |
| 17381461 | TRANSACTION SECURITY TECHNIQUES | July 2021 | February 2024 | Allow | 31 | 1 | 0 | Yes | No |
| 17370142 | HANDS-FREE GESTURES FOR ACCOUNT AUTHENTICATION | July 2021 | August 2024 | Allow | 37 | 2 | 0 | Yes | Yes |
| 17366215 | Sending Secure Communications Using a Local Ephemeral Key Pool | July 2021 | July 2023 | Allow | 25 | 1 | 0 | Yes | No |
| 17363615 | DISTRIBUTED MACHINE LEARNING VIA SECURE MULTI-PARTY COMPUTATION AND ENSEMBLE LEARNING | June 2021 | January 2022 | Allow | 6 | 1 | 0 | Yes | No |
| 17340319 | SERVICE PROVIDING SYSTEM, APPLICATION USAGE METHOD, AND INFORMATION PROCESSING SYSTEM | June 2021 | February 2024 | Allow | 32 | 2 | 0 | No | No |
| 17328160 | NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR TERMINAL DEVICE AND COMMUNICATION DEVICE | May 2021 | March 2025 | Allow | 46 | 4 | 0 | Yes | No |
| 17233984 | STATELESS SERVICE-MEDIATED SECURITY MODULE | April 2021 | September 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17211444 | PROTECTED SESSIONLESS WIFI SENSING | March 2021 | June 2024 | Allow | 39 | 1 | 1 | No | No |
| 17209394 | SYSTEMS AND METHODS FOR ESTABLISHING A SECURE COMMUNICATION LINK IN AN ELECTRIC POWER DISTRIBUTION SYSTEM | March 2021 | October 2023 | Allow | 30 | 2 | 0 | Yes | No |
| 17268595 | USER PLANE SECURITY | February 2021 | August 2023 | Abandon | 30 | 3 | 0 | Yes | No |
| 17169422 | UE WITH INTEGRATED SUBSCRIBER IDENTITY MODULES BY RESOURCE SHARING | February 2021 | August 2023 | Allow | 30 | 1 | 0 | No | No |
| 17168746 | SECURE COMMUNICATIONS WITH AUTONOMOUS VEHICLES | February 2021 | July 2023 | Allow | 29 | 2 | 0 | Yes | No |
| 17159346 | ENHANCED HOP BY HOP SECURITY | January 2021 | May 2025 | Allow | 52 | 2 | 0 | Yes | Yes |
| 17134704 | VERIFICATION OF BITSTREAMS | December 2020 | October 2022 | Allow | 21 | 1 | 0 | No | No |
| 17133711 | TECHNOLOGIES FOR MEMORY AND I/O EFFICIENT OPERATIONS ON HOMOMORPHICALLY ENCRYPTED DATA | December 2020 | February 2025 | Allow | 49 | 3 | 0 | Yes | No |
| 17122638 | Pure Differentially Private Algorithms for Summation in the Shuffled Model | December 2020 | September 2023 | Allow | 33 | 1 | 0 | No | No |
| 17115746 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR AUTOMATIC KEY MANAGEMENT OF NETWORK FUNCTION (NF) REPOSITORY FUNCTION (NRF) ACCESS TOKEN PUBLIC KEYS FOR 5G CORE (5GC) AUTHORIZATION TO MITIGATE SECURITY ATTACKS | December 2020 | December 2023 | Allow | 36 | 2 | 0 | Yes | No |
| 17113471 | AI PRIVACY INTERACTION METHODS FOR SMART GLASSES | December 2020 | July 2024 | Allow | 43 | 4 | 0 | Yes | No |
| 16951450 | ACCESS CONTROL FOR NEAR FIELD COMMUNICATION FUNCTIONS | November 2020 | March 2024 | Allow | 40 | 4 | 0 | Yes | No |
| 17097540 | System and method for securing electronic message | November 2020 | March 2024 | Allow | 40 | 2 | 0 | Yes | No |
| 17080718 | SECURITY VERIFICATION OF COMMUNICATIONS TO TENANTS OF A SHARED SYSTEM | October 2020 | January 2023 | Allow | 27 | 1 | 0 | No | No |
| 17071966 | Apparatus, System and Method for Patient-Authorized Secure and Time-limited Access to Patient Medical Records Utilizing Key Encryption | October 2020 | September 2023 | Allow | 35 | 2 | 0 | Yes | No |
| 16948633 | SELECTIVITY IN PRIVACY AND VERIFICATION WITH APPLICATIONS | September 2020 | September 2022 | Allow | 23 | 0 | 0 | Yes | No |
| 17003398 | PHISHING DATA ITEM CLUSTERING AND ANALYSIS | August 2020 | September 2022 | Allow | 25 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner FIELDS, COURTNEY D.
With a 28.6% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 32.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner FIELDS, COURTNEY D works in Art Unit 2436 and has examined 248 patent applications in our dataset. With an allowance rate of 87.9%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 33 months.
Examiner FIELDS, COURTNEY D's allowance rate of 87.9% places them in the 68% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by FIELDS, COURTNEY D receive 2.10 office actions before reaching final disposition. This places the examiner in the 56% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by FIELDS, COURTNEY D is 33 months. This places the examiner in the 47% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a -4.4% benefit to allowance rate for applications examined by FIELDS, COURTNEY D. This interview benefit is in the 6% percentile among all examiners. Note: Interviews show limited statistical benefit with this examiner compared to others, though they may still be valuable for clarifying issues.
When applicants file an RCE with this examiner, 37.8% of applications are subsequently allowed. This success rate is in the 86% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 30.8% of cases where such amendments are filed. This entry rate is in the 44% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 35.3% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 34% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 72.0% of appeals filed. This is in the 60% percentile among all examiners. Of these withdrawals, 38.9% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 100.0% are granted (fully or in part). This grant rate is in the 91% percentile among all examiners. Strategic Note: Petitions are frequently granted regarding this examiner's actions compared to other examiners. Per MPEP § 1002.02(c), various examiner actions are petitionable to the Technology Center Director, including prematureness of final rejection, refusal to enter amendments, and requirement for information. If you believe an examiner action is improper, consider filing a petition.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 17% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.