Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18714541 | KEY MANAGEMENT METHOD, KEY MANAGEMENT DEVICE AND STORAGE MEDIUM | May 2024 | March 2025 | Allow | 10 | 1 | 0 | No | No |
| 18528320 | Secure Web Container for a Secure Online User Environment | December 2023 | October 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18228468 | DISPOSABLE BROWSERS AND AUTHENTICATION TECHNIQUES FOR A SECURE ONLINE USER ENVIRONMENT | July 2023 | September 2024 | Allow | 13 | 1 | 0 | No | No |
| 18209789 | Hardware Component Monitoring-based Performance of a Remedial Action | June 2023 | June 2025 | Abandon | 24 | 1 | 0 | Yes | No |
| 18121413 | INTERNET OF THINGS SECURITY SYSTEM | March 2023 | July 2024 | Allow | 16 | 1 | 0 | Yes | No |
| 18161445 | SYSTEM AND METHOD FOR AUTOMATICALLY DETECTING A SECURITY VULNERABILITY IN A SOURCE CODE USING A MACHINE LEARNING MODEL | January 2023 | June 2024 | Allow | 16 | 1 | 0 | No | No |
| 18160116 | SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR SOFTWARE DEFINED STORAGE SECURITY PROTECTION | January 2023 | August 2024 | Allow | 19 | 1 | 0 | No | No |
| 18150470 | CONNECTING A CLOUD NETWORK TO THE INTERNET | January 2023 | January 2025 | Abandon | 24 | 1 | 0 | No | No |
| 18150488 | CONNECTING A CLOUD NETWORK TO THE INTERNET | January 2023 | January 2025 | Abandon | 24 | 1 | 0 | No | No |
| 18069146 | SECURITY EVENTS GRAPH FOR ALERT PRIORITIZATION | December 2022 | February 2024 | Allow | 14 | 1 | 0 | No | No |
| 18072526 | SYSTEM FOR DETECTION AND CLASSIFICATION OF INTRUSION USING MACHINE LEARNING TECHNIQUES | November 2022 | February 2024 | Allow | 15 | 1 | 0 | No | No |
| 17992681 | Enforcing Trusted Application Settings for Shared Code Libraries | November 2022 | February 2024 | Allow | 15 | 1 | 0 | No | No |
| 17970790 | IDENTIFYING PERSONALIZED OR ALTERED WEBPAGE CONTENT USING A BROWSER EXTENSION TOOL | October 2022 | April 2025 | Allow | 29 | 1 | 0 | No | No |
| 17949806 | METHODS, SYSTEMS, AND APPARATUSES FOR IMPROVED MULTI-FACTOR AUTHENTICATION IN A MULTI-APP COMMUNICATION SYSTEM | September 2022 | August 2024 | Allow | 23 | 2 | 0 | Yes | No |
| 17932911 | THREAT SCORE PREDICTION MODEL | September 2022 | February 2024 | Allow | 17 | 1 | 0 | No | No |
| 17814410 | SYSTEMS AND METHODS FOR APPLYING ATTESTATION TOKENS TO LISP MESSAGES | July 2022 | July 2024 | Allow | 23 | 1 | 0 | Yes | No |
| 17867780 | METHODS AND ARRANGEMENTS FOR MULTI-LAYER IN-VEHICLE NETWORK INTRUSION DETECTION AND CHARACTERIZATION | July 2022 | March 2024 | Allow | 20 | 1 | 0 | No | No |
| 17843707 | Securing an Anomaly Detection System for Microservice-Based Applications | June 2022 | April 2025 | Abandon | 34 | 1 | 0 | No | No |
| 17676755 | SYSTEM AND METHOD FOR ASSOCIATING CYBERSECURITY INTELLIGENCE TO CYBERTHREAT ACTORS THROUGH A SIMILARITY MATRIX | February 2022 | March 2024 | Allow | 25 | 1 | 0 | No | No |
| 17587512 | AUTOMATIC MICROGATEWAY TAXONOMY TAGS | January 2022 | March 2025 | Allow | 38 | 2 | 0 | Yes | No |
| 17580910 | METHOD AND SYSTEM FOR A CONDITIONAL KEY STORAGE USING NETWORK INFORMATION OF A KEY MANAGEMENT SERVICE | January 2022 | March 2025 | Allow | 37 | 2 | 0 | Yes | No |
| 17578574 | Method and Apparatus for Detecting the Occurrence of a Ransomware Attack on a Storage Volume | January 2022 | January 2025 | Allow | 36 | 2 | 1 | Yes | No |
| 17570354 | TIERING TO GROUP AND ACCESS CONTROL CLOUD NATIVE SECURITY POLICIES | January 2022 | December 2024 | Abandon | 35 | 1 | 0 | No | No |
| 17562421 | ONGOING AND ON-DEMAND SECURE VERIFICATION OF AUDIT COMPLIANCE | December 2021 | October 2023 | Allow | 22 | 1 | 0 | No | No |
| 17503177 | CONNECTING A CLOUD NETWORK TO THE INTERNET | October 2021 | June 2024 | Abandon | 32 | 1 | 0 | No | No |
| 17493364 | CYBERSECURITY INVESTIGATION TOOLS UTILIZING INFORMATION GRAPHS | October 2021 | March 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17449537 | GENERATING ATTACK GRAPHS IN AGILE SECURITY PLATFORMS | September 2021 | September 2023 | Allow | 24 | 1 | 0 | No | No |
| 17447813 | CONTENT BASED SECURITY REQUIREMENTS | September 2021 | April 2025 | Allow | 43 | 3 | 0 | No | No |
| 17404759 | DETECTING VEHICLE MALFUNCTIONS AND CYBER ATTACKS USING MACHINE LEARNING | August 2021 | March 2024 | Allow | 31 | 2 | 0 | Yes | No |
| 17393334 | CENTRALIZED REQUEST PROCESSING AND SECURITY ZONE POLICY ENFORCEMENT IN A CLOUD INFRASTRUCTURE SYSTEM | August 2021 | November 2024 | Allow | 40 | 3 | 0 | Yes | No |
| 17389695 | ENDPOINT AGENT MANAGEMENT SYSTEMS AND METHODS FOR REMOTE ENDPOINT SECURITY | July 2021 | March 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17375419 | CREATION OF GENERALIZED CODE TEMPLATES TO PROTECT WEB APPLICATION COMPONENTS | July 2021 | February 2024 | Abandon | 31 | 1 | 0 | No | No |
| 17373415 | IDENTIFYING MALWARE BASED ON SYSTEM API FUNCTION POINTERS | July 2021 | October 2024 | Allow | 39 | 3 | 0 | Yes | No |
| 17357549 | SYSTEM AND METHOD FOR SECURE MULTITENANT OPERATIONS OF A DISTRIBUTED COMPUTING CLUSTER | June 2021 | February 2024 | Allow | 32 | 2 | 0 | No | No |
| 17353196 | Secure Web Container for a Secure Online User Environment | June 2021 | July 2023 | Allow | 24 | 1 | 0 | No | No |
| 17304200 | GENERATING A NETWORK SECURITY POLICY BASED ON A USER IDENTITY ASSOCIATED WITH MALICIOUS BEHAVIOR | June 2021 | September 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17349258 | COMPUTER SECURITY USING ACTIVITY AND CONTENT SEGREGATION | June 2021 | February 2024 | Abandon | 32 | 1 | 0 | No | No |
| 17338611 | Dynamic, Runtime Application Programming Interface Parameter Labeling, Flow Parameter Tracking and Security Policy Enforcement Using API Call Graph | June 2021 | October 2023 | Allow | 28 | 1 | 0 | No | No |
| 17333454 | VALIDATING COMPLIANCE OF ROLES WITH ACCESS PERMISSIONS | May 2021 | June 2023 | Allow | 24 | 0 | 0 | No | No |
| 17333469 | EVALUATION OF EFFECTIVE ACCESS PERMISSIONS IN IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEMS | May 2021 | July 2024 | Allow | 37 | 2 | 0 | Yes | No |
| 17303444 | IDENTIFYING ACCOUNTS HAVING SHARED CREDENTIALS | May 2021 | May 2023 | Allow | 24 | 1 | 0 | No | No |
| 17329107 | SYSTEMS, METHODS, AND STORAGE MEDIA FOR ABSTRACTION AND ENFORCEMENT IN AN IDENTITY INFRASTRUCTURE | May 2021 | October 2023 | Allow | 29 | 1 | 0 | No | No |
| 17326691 | SYSTEMS AND METHODS FOR NETWORK SECURITY | May 2021 | October 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17245943 | FRAMEWORK FOR CUSTOMER CONTROL AND AUDITING OF OPERATOR ACCESS TO INFRASTRUCTURE IN A CLOUD SERVICE | April 2021 | November 2023 | Allow | 31 | 2 | 0 | No | No |
| 17236942 | AUTOMATED CONTEXTUAL UNDERSTANDING OF UNSTRUCTURED SECURITY DOCUMENTS | April 2021 | October 2023 | Allow | 30 | 2 | 0 | Yes | No |
| 17232999 | DETECTING COMPROMISED CREDENTIALS IN A CREDENTIAL STUFFING ATTACK | April 2021 | June 2024 | Allow | 38 | 3 | 0 | No | No |
| 17225765 | SYSTEM AND METHOD FOR DYNAMICALLY NEUTRALIZING MALICIOUS ONES OF COMMUNICATING ELECTRONIC DEVICES | April 2021 | April 2023 | Allow | 24 | 1 | 0 | No | No |
| 17221570 | Content-Based Application Security for Distributed Computing System | April 2021 | September 2023 | Allow | 29 | 1 | 0 | No | No |
| 17216845 | FRICTIONLESS SUPPLEMENTARY MULTI-FACTOR AUTHENTICATION FOR SENSITIVE TRANSACTIONS WITHIN AN APPLICATION SESSION | March 2021 | June 2024 | Allow | 38 | 3 | 0 | Yes | No |
| 17198924 | AMBIENT SOUNDS-BASED AUTHENTICATION METHOD AND SYSTEM | March 2021 | March 2024 | Allow | 36 | 3 | 0 | Yes | No |
| 17186412 | APPLICATION PROGRAMMING INTERFACE (API) DOMAIN SPECIFIC LANGUAGE | February 2021 | February 2024 | Allow | 36 | 2 | 0 | No | No |
| 17181608 | SYSTEM FOR DETECTION AND CLASSIFICATION OF INTRUSION USING MACHINE LEARNING TECHNIQUES | February 2021 | November 2022 | Allow | 21 | 1 | 0 | No | No |
| 17166925 | SYSTEMS AND METHODS FOR PROTECTING DATA ON DEVICES | February 2021 | July 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17162769 | Methods and Systems for Accurately Assessing Application Access Risk | January 2021 | July 2023 | Allow | 29 | 1 | 0 | No | No |
| 17160881 | SYSTEMS AND METHODS TO CONTROL DATA ACCESS AND USAGE | January 2021 | March 2023 | Allow | 26 | 1 | 0 | No | No |
| 17160053 | Machine Learning-based Hardware Component Monitoring | January 2021 | March 2023 | Allow | 26 | 1 | 0 | No | No |
| 17148684 | RAPID INITIAL DEPLOYMENT DATABASE SECURITY MODEL | January 2021 | April 2024 | Allow | 39 | 3 | 0 | Yes | No |
| 17142671 | INTERCEPTING REPORTS OF HARMFUL E-MAILS THAT ARE REPORTED TO AN AUTHORITY | January 2021 | March 2023 | Allow | 26 | 1 | 0 | No | No |
| 17118054 | POWER DETECTION FOR IDENTIFYING SUSPICIOUS DEVICES | December 2020 | January 2023 | Allow | 25 | 0 | 0 | No | No |
| 17112366 | METHOD AND APPARATUS FOR GENERATING AND PROVIDING A TEMPORARY PASSWORD TO CONTROL ACCESS TO A RECORD CREATED IN RESPONSE TO AN ELECTRONIC MESSAGE | December 2020 | March 2023 | Allow | 27 | 1 | 0 | No | No |
| 17107082 | Forecast-Based Permissions Recommendations | November 2020 | January 2023 | Allow | 26 | 1 | 0 | No | No |
| 17080833 | Disposable Browsers and Authentication Techniques for a Secure Online User Environment | October 2020 | March 2023 | Allow | 28 | 1 | 0 | No | No |
| 17070930 | Enforcing Trusted Application Settings for Shared Code Libraries | October 2020 | November 2022 | Allow | 25 | 1 | 0 | No | No |
| 17064552 | PROCESSOR THAT MITIGATES SIDE CHANNEL ATTACKS BY PREVENTS CACHE LINE DATA IMPLICATED BY A MISSING LOAD ADDRESS FROM BEING FILLED INTO A DATA CACHE MEMORY WHEN THE LOAD ADDRESS SPECIFIES A LOCATION WITH NO VALID ADDRESS TRANSLATION OR NO PERMISSION TO READ FROM THE LOCATION | October 2020 | June 2023 | Allow | 32 | 1 | 0 | Yes | No |
| 17034714 | INTERNET OF THINGS SECURITY SYSTEM | September 2020 | January 2023 | Allow | 28 | 1 | 0 | No | No |
| 17029802 | Lightweight Secure Autonomic Control Plane | September 2020 | January 2023 | Allow | 27 | 1 | 0 | No | No |
| 16948399 | NETWORK SECURITY ORCHESTRATION AND MANAGEMENT ACROSS DIFFERENT CLOUDS | September 2020 | July 2024 | Allow | 46 | 3 | 0 | Yes | No |
| 16981219 | Trusted Execution Security Policy Platform | September 2020 | August 2023 | Allow | 35 | 2 | 0 | Yes | No |
| 17005478 | SYSTEMS AND METHODS FOR COUNTERING REMOVAL OF DIGITAL FORENSICS INFORMATION BY MALICIOUS SOFTWARE | August 2020 | December 2022 | Allow | 28 | 1 | 0 | No | No |
| 16944945 | METHOD FOR ATTACK PROTECTION IN IOT DEVICES | July 2020 | February 2023 | Allow | 30 | 1 | 0 | No | No |
| 16946088 | DATA STORAGE SYSTEM WITH POWERED MOVE ATTACK PROTECTION | June 2020 | November 2022 | Allow | 29 | 1 | 0 | No | No |
| 16883022 | METHOD AND SYSTEM FOR DATA SECURITY AND APPARATUS FOR EXECUTING THE SAME | May 2020 | November 2022 | Allow | 29 | 1 | 0 | No | No |
| 16864395 | METHODS FOR PROVISIONING UNIVERSAL INTEGRATED CIRCUIT CARDS | May 2020 | September 2020 | Allow | 5 | 0 | 0 | Yes | No |
| 16760217 | INFORMATION PROCESSING APPARATUS, MOVING APPARATUS, AND METHOD | April 2020 | October 2022 | Allow | 29 | 1 | 0 | No | No |
| 16858779 | DATA INTEGRATION SYSTEM FOR TRIGGERING ANALYSIS OF CONNECTION OSCILLATIONS | April 2020 | September 2020 | Allow | 5 | 0 | 0 | Yes | No |
| 16755465 | Vehicular Control Apparatus | April 2020 | November 2022 | Allow | 32 | 1 | 0 | No | No |
| 16838054 | Validating the Use of User Credentials in a Penetration Testing Campaign | April 2020 | October 2021 | Allow | 18 | 0 | 0 | No | No |
| 16828612 | REVERSE PROXY SERVERS FOR IMPLEMENTING APPLICATION LAYER-BASED AND TRANSPORT LAYER-BASED SECURITY RULES | March 2020 | July 2023 | Allow | 40 | 2 | 0 | Yes | No |
| 16787552 | END USER SECURITY MANAGER | February 2020 | September 2022 | Allow | 31 | 2 | 0 | Yes | No |
| 16777187 | SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR SOFTWARE DEFINED STORAGE SECURITY PROTECTION | January 2020 | October 2022 | Allow | 33 | 1 | 0 | No | No |
| 16634551 | METHOD FOR ACQURING MAIL BOX ACCOUNT IN SYSTEM | January 2020 | March 2023 | Allow | 37 | 2 | 0 | No | No |
| 16746237 | METHOD, SYSTEM AND APPARATUS FOR NFC SECURITY | January 2020 | June 2021 | Allow | 17 | 1 | 0 | Yes | No |
| 16735700 | Enforcing Trusted Application Settings for Shared Code Libraries | January 2020 | September 2020 | Allow | 8 | 0 | 0 | Yes | No |
| 16729133 | ARTIFICIAL INTELLIGENCE (AI) ASSISTED ANOMALY DETECTION OF INTRUSION IN STORAGE SYSTEMS | December 2019 | July 2022 | Allow | 30 | 1 | 0 | Yes | No |
| 16727565 | METHODS AND ARRANGEMENTS FOR MULTI-LAYER IN-VEHICLE NETWORK INTRUSION DETECTION AND CHARACTERIZATION | December 2019 | April 2022 | Allow | 28 | 1 | 0 | No | No |
| 16725401 | BIOMETRIC CLOUD AUTHENTICATION GATEWAY DATABASE SYSTEM AND METHOD OF USE | December 2019 | May 2022 | Allow | 29 | 4 | 0 | Yes | No |
| 16711819 | Ransomware Detection and Mitigation | December 2019 | August 2022 | Allow | 33 | 2 | 0 | Yes | No |
| 16699112 | CLIENT AUTHENTICATION MANAGEMENT BASED UPON MODELING | November 2019 | August 2022 | Allow | 32 | 1 | 0 | Yes | No |
| 16688846 | CONNECTING A CLOUD NETWORK TO THE INTERNET | November 2019 | July 2021 | Allow | 20 | 1 | 0 | Yes | No |
| 16589489 | KEY THROTTLING TO MITIGATE UNAUTHORIZED FILE ACCESS | October 2019 | December 2020 | Allow | 15 | 0 | 0 | Yes | No |
| 16583321 | CONTAINER INDEPENDENT SECURE FILE SYSTEM FOR SECURITY APPLICATION CONTAINERS | September 2019 | June 2021 | Allow | 21 | 1 | 0 | Yes | No |
| 16576006 | IDENTIFYING ACCOUNTS HAVING SHARED CREDENTIALS | September 2019 | April 2021 | Allow | 18 | 1 | 0 | Yes | No |
| 16574771 | SYSTEMS AND METHODS FOR APPLYING ATTESTATION TOKENS TO LISP MESSAGES | September 2019 | April 2022 | Allow | 30 | 1 | 0 | Yes | No |
| 16554833 | GENERATING ATTACK GRAPHS IN AGILE SECURITY PLATFORMS | August 2019 | September 2021 | Allow | 24 | 0 | 0 | No | No |
| 16549506 | MEMORY SYSTEM | August 2019 | September 2022 | Allow | 37 | 2 | 0 | No | No |
| 16549019 | SYSTEM AND METHOD FOR AUTOMATICALLY DETECTING A SECURITY VULNERABILITY IN A SOURCE CODE USING A MACHINE LEARNING MODEL | August 2019 | September 2022 | Allow | 37 | 1 | 0 | No | No |
| 16547250 | METHODS AND APPARATUS TO DECONFLICT MALWARE OR CONTENT REMEDIATION | August 2019 | November 2021 | Allow | 27 | 1 | 0 | No | No |
| 16527425 | DYNAMIC ACCESS CONTROLS USING VERIFIABLE CLAIMS | July 2019 | August 2022 | Allow | 37 | 3 | 0 | Yes | No |
| 16506046 | PRIVATE KEY OPERATIONS | July 2019 | November 2021 | Abandon | 28 | 2 | 0 | No | No |
| 16450579 | SYSTEM AND METHOD FOR AUTOMATICALLY ASSOCIATING CYBERSECURITY INTELLIGENCE TO CYBERTHREAT ACTORS | June 2019 | October 2021 | Allow | 27 | 0 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner GAO, SHU CHUN.
With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 60.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is in the top 25% across the USPTO, indicating that filing appeals is particularly effective here. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner GAO, SHU CHUN works in Art Unit 2437 and has examined 251 patent applications in our dataset. With an allowance rate of 89.6%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 30 months.
Examiner GAO, SHU CHUN's allowance rate of 89.6% places them in the 69% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by GAO, SHU CHUN receive 1.66 office actions before reaching final disposition. This places the examiner in the 46% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by GAO, SHU CHUN is 30 months. This places the examiner in the 41% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +17.6% benefit to allowance rate for applications examined by GAO, SHU CHUN. This interview benefit is in the 63% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 33.0% of applications are subsequently allowed. This success rate is in the 64% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 28.8% of cases where such amendments are filed. This entry rate is in the 33% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 50.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 41% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 83.3% of appeals filed. This is in the 73% percentile among all examiners. Of these withdrawals, 40.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 50.0% are granted (fully or in part). This grant rate is in the 60% percentile among all examiners. Strategic Note: Petitions show above-average success regarding this examiner's actions. Petitionable matters include restriction requirements (MPEP § 1002.02(c)(2)) and various procedural issues.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 13% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.9% of allowed cases (in the 55% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.