Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19170903 | SOFTWARE COMPOSITION ANALYSIS (SCA) TO IDENTIFY AI-GENERATED CODE THAT IS COPIED CODE FROM THIRD-PARTY LIBRARIES | April 2025 | June 2025 | Allow | 2 | 0 | 0 | Yes | No |
| 19052090 | Detection of Vulnerabilities in Computational Graphs | February 2025 | December 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 19022847 | SYSTEMS AND METHODS FOR DYNAMICALLY DETERMINING ASSESSMENT RESULTS | January 2025 | November 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 18975340 | ARTIFICIAL INTELLIGENCE FOR CYBER THREAT INTELLIGENCE | December 2024 | May 2025 | Allow | 6 | 1 | 0 | Yes | No |
| 18969536 | Cyber Detection Analytics Engine | December 2024 | March 2025 | Allow | 3 | 0 | 0 | Yes | No |
| 18966866 | COMPUTER-BASED SYSTEMS CONFIGURED FOR MALWARE DETECTION AND METHODS OF USE THEREOF | December 2024 | March 2025 | Allow | 4 | 1 | 0 | Yes | No |
| 18940914 | SYSTEM AND METHOD TO ANALYZE SECURITY ACROSS DIGITAL ENVIRONMENTS | November 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18927703 | Cryptography Bill of Materials (CBOM) Generation from Binary Executables | October 2024 | January 2025 | Allow | 2 | 0 | 0 | No | No |
| 18887044 | SECURITY CONTROL SYSTEM AND METHOD | September 2024 | August 2025 | Allow | 10 | 2 | 0 | Yes | No |
| 18882699 | Host Deduplication for Vulnerability Detection and Management in IT Systems | September 2024 | November 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18819112 | SUPPLEMENTAL ATTACK SURFACE SCANNER (SASS) CONFIGURATION INTEGRATION COMPONENT | August 2024 | January 2026 | Allow | 17 | 0 | 0 | No | No |
| 18811662 | Systems and Methods for Assessing Security in a Computing Device Environment | August 2024 | June 2025 | Abandon | 10 | 1 | 0 | No | No |
| 18790022 | SYSTEM AND METHOD FOR AUTOMATED EXPLOITATION GENERATION | July 2024 | June 2025 | Allow | 10 | 2 | 0 | No | No |
| 18791301 | Cryptography Bill of Materials (CBOM) Generation from Binary Executables | July 2024 | October 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18790060 | LARGE LANGUAGE MODEL-BASED VULNERABILITY REMEDIATION ACTION DESCRIPTIONS | July 2024 | March 2026 | Allow | 19 | 0 | 0 | Yes | No |
| 18767063 | Cybersecurity Vulnerability Management Program Evaluation System | July 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18756892 | SECURITY INTERCEPTOR FOR GENERATIVE ARTIFICIAL INTELLIGENCE PLATFORMS | June 2024 | October 2025 | Allow | 15 | 0 | 0 | Yes | No |
| 18657330 | ACCURACY IN ATTACK TECHNIQUE LABELING IN AN EXTENDED DETECTION SYSTEM | May 2024 | September 2025 | Allow | 16 | 0 | 0 | No | No |
| 18656895 | CLASSIFIER FOR IDENTIFYING SUSPICIOUS PDF FILES TO LIMIT DEEP-SCANNING | May 2024 | March 2025 | Allow | 11 | 2 | 0 | Yes | No |
| 18651045 | REQUIREMENT OPERATIONAL DEFINITIONS FOR INFORMATION SECURITY AND PRIVACY COMPLIANCE | April 2024 | October 2025 | Allow | 17 | 0 | 0 | Yes | No |
| 18649484 | TECHNIQUES FOR IDENTIFYING GAPS IN SECURITY CONTROLS | April 2024 | October 2024 | Allow | 6 | 1 | 0 | No | No |
| 18649916 | ELECTRONIC SYSTEM FOR GENERATING AND TRACKING LINKED ELECTRONIC DIGITAL CERTIFICATES | April 2024 | July 2025 | Allow | 14 | 1 | 0 | No | No |
| 18639082 | SYSTEMS AND METHODS FOR PROCESSING AND TRANSMITTING SENSOR DATA | April 2024 | November 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18615543 | PROCESS TREE AND TAGS | March 2024 | August 2025 | Allow | 17 | 0 | 0 | No | No |
| 18615649 | VIRTUAL REALITY INFORMATION DELIVERY SYSTEM | March 2024 | September 2025 | Allow | 18 | 1 | 0 | Yes | No |
| 18693987 | BACKDOOR DETECTION DEVICE, BACKDOOR DETECTION METHOD, AND RECORDING MEDIUM | March 2024 | March 2026 | Abandon | 24 | 1 | 0 | No | No |
| 18693067 | CERTIFICATE MONITOR SERVICE RELIABILITY DETECTION METHOD FOR PKI CERTIFICATE TRANSPARENCY SYSTEM | March 2024 | January 2026 | Allow | 22 | 1 | 0 | No | No |
| 18603782 | Systems and Methods for Validation of a Device | March 2024 | January 2026 | Allow | 22 | 0 | 0 | Yes | No |
| 18593568 | Techniques for Inspecting Managed Workloads Deployed in a Cloud computing Environment | March 2024 | March 2026 | Allow | 25 | 2 | 0 | Yes | No |
| 18435759 | SYSTEM AND METHOD FOR PRIVATE REGISTRY CYBERSECURITY INSPECTION | February 2024 | March 2025 | Allow | 13 | 2 | 0 | No | No |
| 18430366 | Host Deduplication for Vulnerability Detection and Management in IT Systems | February 2024 | November 2024 | Allow | 10 | 0 | 0 | Yes | No |
| 18429825 | NETWORK-BASED DEVICE AUTHENTICATION SYSTEM | February 2024 | November 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18290589 | ABNORMALITY DETECTING DEVICE, SECURITY SYSTEM, AND ABNORMALITY NOTIFICATION METHOD | January 2024 | March 2026 | Allow | 26 | 2 | 0 | Yes | No |
| 18404630 | MEMORY SYSTEMS AND OPERATION METHODS THEREOF, HOST AND OPERATION METHODS THEREOF, AND ELECTRONIC APPARATUSES | January 2024 | June 2025 | Allow | 18 | 0 | 0 | No | No |
| 18401547 | AUTONOMOUS NETWORK POLICY GENERATOR | December 2023 | June 2025 | Allow | 17 | 0 | 0 | No | No |
| 18397544 | SYSTEM AND METHOD FOR PROVIDING THIRD PARTY COMPLIANCE TO COMPUTER AND SOFTWARE ENVIRONMENTS | December 2023 | September 2024 | Allow | 8 | 0 | 0 | Yes | No |
| 18394708 | SYSTEMS AND METHODS FOR TRANSLATING DIFFERENT VULNERABILITY SCAN RESULTS INTO A STANDARDIZED FORMAT AND FOR CERTIFYING TARGET RESOURCES AGAINST DETECTION OF VULNERABILITIES | December 2023 | July 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18391440 | USE OF WORD EMBEDDINGS TO LOCATE SENSITIVE TEXT IN COMPUTER PROGRAMMING SCRIPTS | December 2023 | December 2024 | Allow | 12 | 1 | 0 | No | No |
| 18545955 | Systems And Methods For Assessing Security In A Computing Device Environment | December 2023 | August 2025 | Allow | 19 | 2 | 0 | Yes | No |
| 18540980 | RISK SCORING SYSTEM FOR VULNERABILITY MITIGATION | December 2023 | April 2025 | Allow | 16 | 2 | 0 | No | No |
| 18535873 | SYSTEMS AND METHODS FOR FACILITATING USE OF ARTIFICIAL INTELLIGENCE PLATFORMS TRAINED ON BLOCKCHAIN ACTION LINEAGES TO CONDUCT BLOCKCHAIN ACTIONS | December 2023 | March 2024 | Allow | 3 | 0 | 0 | Yes | No |
| 18517713 | Systems and Methods for Validation of a Device | November 2023 | February 2024 | Allow | 2 | 0 | 0 | No | No |
| 18513168 | DERIVED UNIQUE TOKEN PER TRANSACTION | November 2023 | June 2025 | Allow | 19 | 0 | 0 | Yes | No |
| 18560807 | KILL CHAIN IDENTIFICATIONS | November 2023 | September 2025 | Allow | 22 | 0 | 1 | Yes | No |
| 18468166 | TECHNIQUES FOR INSPECTING MANAGED WORKLOADS DEPLOYED IN A CLOUD COMPUTING ENVIRONMENT | September 2023 | December 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 18235413 | METHOD FOR ANONYMIZING MOVEMENT DATA | August 2023 | October 2024 | Allow | 14 | 1 | 0 | No | No |
| 18235411 | METHOD FOR ANONYMIZING MOVEMENT DATA | August 2023 | November 2024 | Allow | 15 | 2 | 0 | No | Yes |
| 18361507 | SYSTEMS AND METHODS FOR CONDUCTING BLOCKCHAIN ACTIONS BASED ON NETWORK MAPPINGS OF SELF-EXECUTING PROGRAM CHARACTERISTICS | July 2023 | October 2023 | Allow | 3 | 0 | 0 | Yes | No |
| 18358917 | SYSTEMS AND METHODS FOR CONDUCTING BLOCKCHAIN ACTIONS BASED ON NETWORK MAPPINGS OF SELF-EXECUTING PROGRAM CHARACTERISTICS | July 2023 | June 2024 | Allow | 11 | 0 | 0 | Yes | No |
| 18217435 | Vulnerability Tracking Using Smatch Values of Scopes | June 2023 | May 2024 | Allow | 10 | 1 | 0 | Yes | No |
| 18213983 | OPERATIONAL CHARACTERISTIC-BASED CONTAINER MANAGEMENT | June 2023 | March 2026 | Allow | 32 | 2 | 0 | Yes | No |
| 18322887 | CYBERSECURITY INCIDENT RESPONSE AND SECURITY OPERATION SYSTEM EMPLOYING PLAYBOOK GENERATION THROUGH CUSTOM MACHINE LEARNING | May 2023 | July 2024 | Allow | 14 | 1 | 0 | Yes | No |
| 18318254 | ACCESS ORCHESTRATION ENGINE IN A CLOUD ACCESS MANAGEMENT SYSTEM | May 2023 | November 2025 | Allow | 30 | 1 | 1 | Yes | No |
| 18310053 | NETWORK-BASED DEVICE AUTHENTICATION SYSTEM | May 2023 | December 2023 | Allow | 8 | 0 | 0 | Yes | No |
| 18139274 | PLATFORM AND METHOD FOR ASSESSMENT AND VERIFICATION OF SOFTWARE BILL OF MATERIALS (SBOM) AND VULNERABILITIES ACROSS A SOFTWARE SUPPLY CHAIN LIFE CYCLE USING BLOCKCHAIN | April 2023 | August 2023 | Allow | 4 | 0 | 0 | Yes | No |
| 18132783 | SYSTEMS AND METHODS FOR AUTOMATED SYSTEM REQUIREMENT ANALYSIS | April 2023 | January 2024 | Allow | 9 | 0 | 0 | Yes | No |
| 18130290 | SYSTEM AND APPARATUS FOR SECURE PASSWORD RECOVERY AND IDENTITY VERIFICATION | April 2023 | March 2025 | Abandon | 24 | 2 | 0 | No | No |
| 18245383 | METHOD FOR CONFIRMING OWNERSHIP OF DIGITAL ASSETS BASED ON HASH ALGORITHM AND METHOD FOR TRACING TO A SOURCE OF DIGITAL ASSETS BASED ON HASH ALGORITHM | March 2023 | February 2025 | Allow | 23 | 0 | 0 | Yes | No |
| 18112987 | METHODS FOR PROTECTING WEB BASED RESOURCES FROM D/DoS ATTACKS AND DEVICES THEREOF | February 2023 | May 2025 | Allow | 26 | 4 | 0 | Yes | No |
| 18020512 | METHOD FOR ANONYMIZING MOVEMENT DATA | February 2023 | May 2023 | Allow | 3 | 0 | 0 | No | No |
| 18007362 | Computer-implemented method for testing the cybersecurity of a target environment | January 2023 | April 2025 | Allow | 27 | 0 | 0 | No | No |
| 18101295 | COMPUTER SYSTEM VULNERABILITY LOCKDOWN MODE | January 2023 | August 2023 | Allow | 7 | 0 | 0 | Yes | No |
| 18152694 | SYSTEMS AND METHODS FOR CONDUCTING BLOCKCHAIN ACTIONS BASED ON NETWORK MAPPINGS OF SELF-EXECUTING PROGRAM CHARACTERISTICS | January 2023 | June 2023 | Allow | 5 | 0 | 0 | Yes | No |
| 18094431 | MANAGING CRYPTOGRAPHIC COMPLIANCE ON A COMPUTING DEVICE USING A DISTRIBUTED LEDGER | January 2023 | February 2025 | Allow | 26 | 0 | 0 | Yes | No |
| 18092220 | Systems and Methods for Assessing Security in a Computing Environment | December 2022 | March 2023 | Allow | 3 | 1 | 0 | Yes | No |
| 18012927 | PASSWORD HARDCODING CHECKING METHOD AND APPARATUS BASED ON PCA, AND MEDIUM | December 2022 | April 2023 | Allow | 4 | 0 | 0 | Yes | No |
| 18061107 | HYBRID CLOUD-BASED SECURITY SERVICE METHOD AND APPARATUS FOR SECURITY OF CONFIDENTIAL DATA | December 2022 | May 2025 | Allow | 30 | 1 | 0 | No | No |
| 18071977 | SYSTEM AND METHOD FOR EVALUATING PERFORMANCE OF A PATCHING PROCESS OF AN ENTERPRISE NETWORK | November 2022 | September 2024 | Allow | 22 | 0 | 0 | No | No |
| 17928484 | A METHOD FOR FINDING VULNERABILITIES IN A SOFTWARE PROJECT | November 2022 | April 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 17985717 | METHOD AND SYSTEM FOR SOFTWARE SECURITY VULNERABILITY DIAGNOSTIC ASSESSMENT | November 2022 | October 2024 | Allow | 23 | 1 | 0 | No | No |
| 17963900 | APPARATUS AND METHOD FOR UPDATING CYBER SECURITY SUPPORT BASED ON REAL-TIME CHANGES | October 2022 | June 2023 | Allow | 8 | 1 | 0 | Yes | No |
| 17959607 | SYSTEMS AND METHODS FOR PROVIDING A RESPONSE TO A DATABASE QUERY | October 2022 | July 2025 | Allow | 33 | 1 | 0 | Yes | No |
| 17937020 | DATA PLATFORM USER KEY-ROTATOR | September 2022 | June 2025 | Abandon | 33 | 1 | 0 | No | No |
| 17947840 | MEMORY DEDUPLICATION FOR ENCRYPTED VIRTUAL MACHINES | September 2022 | August 2025 | Allow | 35 | 2 | 0 | Yes | No |
| 17941935 | Vulnerability Tracing Using Scope and Offset | September 2022 | April 2023 | Allow | 7 | 0 | 0 | No | No |
| 17929370 | Method For Protection From Cyber Attacks To A Vehicle Based Upon Time Analysis, And Corresponding Device | September 2022 | October 2024 | Allow | 26 | 1 | 0 | No | No |
| 17893891 | METHOD FOR EVOLVING ROOT OF TRUST AND ELECTRONIC DEVICE USING THE SAME | August 2022 | June 2024 | Allow | 22 | 0 | 0 | No | No |
| 17890628 | PARALLEL SECRET SALT GENERATION AND AUTHENTICATION FOR ENCRYPTED COMMUNICATION | August 2022 | August 2024 | Allow | 24 | 0 | 0 | Yes | No |
| 17798743 | APPARATUS AND METHOD FOR AUTOMATED POLICY MANAGEMENT FOR DEPLOYING APPLICATIONS | August 2022 | September 2024 | Allow | 25 | 1 | 0 | No | No |
| 17876420 | Cloud Profile | July 2022 | August 2024 | Allow | 24 | 0 | 0 | No | No |
| 17874562 | SYSTEMS, METHODS, AND USER INTERFACES FOR INTELLIGENT AND EXPEDITED GENERATION OF CYBERSECURITY ARTIFACTS USING CYBERSECURITY CONTROL DATA OBJECTS | July 2022 | June 2025 | Abandon | 35 | 2 | 0 | No | No |
| 17875294 | SYSTEMS AND METHODS FOR MANAGING AND PROVIDING SOFTWARE PACKAGES WHICH HAVE UNDERGONE MALWARE AND/OR VULNERABILITY ANALYSIS | July 2022 | October 2022 | Allow | 3 | 0 | 0 | Yes | No |
| 17792147 | SECURE COMPUTATION APPARATUS, SECURE COMPUTATION METHOD, AND PROGRAM | July 2022 | October 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17859862 | METHOD FOR DETERMINING LIKELY MALICIOUS BEHAVIOR BASED ON ABNORMAL BEHAVIOR PATTERN COMPARISON | July 2022 | January 2026 | Allow | 42 | 3 | 0 | Yes | No |
| 17860001 | APPARATUS AND METHOD FOR PROCESSING DISTRIBUTED CONSENSUS USING MULTI-SIGNATURE | July 2022 | August 2024 | Allow | 26 | 1 | 0 | No | No |
| 17750378 | SYSTEMS, METHODS, AND USER INTERFACES FOR INTELLIGENT AND EXPEDITED GENERATION OF CYBERSECURITY ARTIFACTS USING CYBERSECURITY CONTROL DATA OBJECTS | May 2022 | July 2022 | Allow | 2 | 0 | 0 | Yes | No |
| 17742465 | SECURITY POSTURE RECOMMENDER SYSTEM | May 2022 | May 2025 | Allow | 36 | 1 | 0 | No | No |
| 17733562 | SECURE ELEMENT ENFORCING A SECURITY POLICY FOR DEVICE PERIPHERALS | April 2022 | September 2024 | Allow | 29 | 0 | 0 | Yes | No |
| 17658797 | REGULATION BASED PROTECTION OF DATA FOR STORAGE SYSTEMS | April 2022 | December 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17717741 | Cybersecurity Vulnerability Management Program Evaluation System | April 2022 | April 2024 | Allow | 24 | 0 | 0 | No | No |
| 17715472 | IMAGE ENCRYPTION | April 2022 | May 2024 | Allow | 25 | 0 | 0 | No | No |
| 17658149 | SYSTEMS AND METHODS FOR MALWARE DETECTION | April 2022 | November 2023 | Allow | 20 | 3 | 0 | Yes | No |
| 17706567 | Distribution and Management of Services in Virtual Environments | March 2022 | September 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17704877 | RETROACTIVELY ADDING ENCRYPTION AND/OR AUTHENTICATION LEVELS TO A BLOCKCHAIN | March 2022 | May 2024 | Allow | 26 | 0 | 0 | Yes | No |
| 17655851 | PROVIDING ACCESS TO A PRIVATE RESOURCE IN AN ENTERPRISE SOCIAL NETWORKING SYSTEM | March 2022 | April 2024 | Allow | 25 | 2 | 0 | Yes | No |
| 17762491 | SECURITY RISK ANALYSIS ASSISTANCE DEVICE, METHOD, AND COMPUTER-READABLE MEDIUM | March 2022 | February 2025 | Allow | 35 | 2 | 0 | No | No |
| 17653762 | CYBERSECURITY INCIDENT RESPONSE AND SECURITY OPERATION SYSTEM EMPLOYING PLAYBOOK GENERATION THROUGH CUSTOM MACHINE LEARNING | March 2022 | March 2023 | Allow | 13 | 0 | 0 | Yes | No |
| 17676116 | METHODS AND APPARATUS FOR PROVIDING BIOMETRIC AUTHENTICATION AND AUTHORIZATION SERVICES | February 2022 | July 2025 | Allow | 41 | 2 | 0 | Yes | No |
| 17592714 | SYSTEMS AND METHODS FOR REDUCTION OF PRIVACY RISK IN DATA | February 2022 | December 2024 | Allow | 34 | 2 | 0 | Yes | No |
| 17632734 | ONBOARD COMPUTER, COMPUTER PROGRAM, COMPUTER-READABLE RECORDING MEDIUM, AND SECURITY SETTING METHOD | February 2022 | April 2025 | Allow | 38 | 3 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner TRAORE, FATOUMATA.
With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 28.8% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner TRAORE, FATOUMATA works in Art Unit 2436 and has examined 639 patent applications in our dataset. With an allowance rate of 81.1%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 32 months.
Examiner TRAORE, FATOUMATA's allowance rate of 81.1% places them in the 52% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by TRAORE, FATOUMATA receive 2.12 office actions before reaching final disposition. This places the examiner in the 57% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by TRAORE, FATOUMATA is 32 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +39.4% benefit to allowance rate for applications examined by TRAORE, FATOUMATA. This interview benefit is in the 87% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 29.1% of applications are subsequently allowed. This success rate is in the 54% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 17.8% of cases where such amendments are filed. This entry rate is in the 21% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 81.2% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 64% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 77.4% of appeals filed. This is in the 69% percentile among all examiners. Of these withdrawals, 43.8% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 43.8% are granted (fully or in part). This grant rate is in the 36% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 5.3% of allowed cases (in the 86% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.8% of allowed cases (in the 59% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.