Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19169111 | PARTIALLY HOMOMORPHIC ENCRYPTION (PHE) IN DISTRIBUTED 1-BIT LARGE LANGUAGE MODEL (LLM) ARCHITECTURE | April 2025 | October 2025 | Allow | 6 | 2 | 0 | No | No |
| 19080000 | SYSTEM AND METHOD FOR SECURE KNOWLEDGE DISTILLATION USING HOMOMORPHIC ENCRYPTION IN MACHINE LEARNING ENVIRONMENTS | March 2025 | August 2025 | Allow | 5 | 1 | 0 | No | No |
| 19056084 | COMPUTING SYSTEM FOR FULLY HOMOMORPHIC ENCRYPTION APPLICATIONS USING PARALLELIZABLE HYBRID BOOTSTRAPPING | February 2025 | April 2025 | Allow | 2 | 0 | 0 | No | No |
| 19006173 | HIGH-TEMPORAL-ACCURACY ELECTROMAGNETIC FAULT INJECTION METHOD AND APPARATUS FOR CRYPTOGRAPHIC CHIP | December 2024 | May 2025 | Allow | 4 | 0 | 0 | No | No |
| 19004215 | CONFIDENTIAL COMPUTING-BASED METHOD FOR CUSTOMIZEDLY BALANCING BETWEEN SECURITY AND PERFORMANCE OF HOMOMORPHIC ENCRYPTION | December 2024 | July 2025 | Allow | 6 | 1 | 0 | No | No |
| 18946352 | ADAPTIVE HOMOMORPHIC ENCRYPTION METHOD BASED ON TRUSTED EXECUTION ENVIRONMENT | November 2024 | March 2025 | Allow | 4 | 0 | 0 | No | No |
| 18941347 | COMPUTER-IMPLEMENTED METHOD FOR DETERMINING A FREQUENCY CONTENT OF AN ENCRYPTED RAW AUDIO SIGNAL | November 2024 | June 2025 | Allow | 7 | 1 | 0 | Yes | No |
| 18807438 | System and Method for Real-time Detection of Unrestricted File Upload Vulnerabilities in Node.js Applications | August 2024 | November 2024 | Allow | 3 | 1 | 0 | No | No |
| 18796250 | METHOD AND AN ELECTRONIC DEVICE FOR DECODING INFORMATION IN A MULTI-DIMENSIONAL ENCRYPTED CODE | August 2024 | July 2025 | Allow | 11 | 2 | 0 | No | No |
| 18789018 | A METHOD OF OPTIMIZING LINEAR TRANSFORMATION | July 2024 | March 2026 | Allow | 19 | 1 | 0 | Yes | No |
| 18744901 | ENHANCED ENCRYPTION FOR FACE-RELATED DATA | June 2024 | February 2026 | Allow | 20 | 1 | 0 | No | No |
| 18737485 | INTEGRATED SECURITY ANALYSIS DATA STRUCTURE AND METHOD FOR MULTI-CONTAINER SOFTWARE PROJECTS | June 2024 | October 2025 | Allow | 16 | 0 | 0 | No | No |
| 18662448 | AGENTLESS RUNTIME CYBERSECURITY ANALYSIS | May 2024 | March 2026 | Allow | 22 | 1 | 0 | No | No |
| 18627259 | Managing Implementation Of Application-Code Scanning Processes | April 2024 | February 2026 | Allow | 22 | 1 | 0 | Yes | No |
| 18613785 | Object Movement Method, Apparatus and Electronic Device | March 2024 | February 2026 | Allow | 22 | 1 | 0 | No | No |
| 18607279 | GENERATING REMEDIATION STRATEGIES FOR RESPONDING TO SECURITY DEFICIENCIES USING GENERATIVE MACHINE LEARNING MODELS | March 2024 | February 2026 | Allow | 23 | 1 | 0 | Yes | No |
| 18606839 | METHOD AND SYSTEM FOR ASSESING RISK ASSOCIATED WITH AI MODELS | March 2024 | February 2026 | Allow | 23 | 1 | 0 | No | No |
| 18436862 | AGENTLESS RUNTIME CYBERSECURITY ANALYSIS | February 2024 | June 2024 | Allow | 4 | 1 | 0 | No | No |
| 18430355 | Container Image Deduplication for Vulnerability Detection and Management in IT Systems | February 2024 | August 2024 | Allow | 6 | 0 | 0 | No | No |
| 18429388 | CRYPTOGRAPHIC METHOD TO CERTIFY RETENTION LOCK STATUS WITH AN EMBEDDED VERIFICATION LOG IN A BACKUP SYSTEM | January 2024 | December 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18426038 | HIERARCHICAL RISK SCORING FOR SAAS APPLICATIONS | January 2024 | August 2024 | Allow | 7 | 1 | 0 | No | No |
| 18418938 | CRYPTOGRAPHIC METHOD TO CERTIFY RETENTION LOCK STATUS FOR OPAQUE DATA IN A BACKUP SYSTEM | January 2024 | December 2025 | Allow | 22 | 1 | 0 | Yes | No |
| 18414325 | SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT REST | January 2024 | April 2024 | Allow | 3 | 1 | 0 | No | No |
| 18400689 | METHODS AND APPARATUSES FOR JOINTLY PROCESSING DATA BY TWO PARTIES FOR DATA PRIVACY PROTECTION | December 2023 | February 2026 | Allow | 26 | 2 | 0 | No | No |
| 18394419 | Homomorphic Encryption-Based Image Encryption And Decryption Method And Device | December 2023 | November 2025 | Allow | 23 | 1 | 0 | No | No |
| 18528247 | Counting Machine for Manufacturing and Validating Event-Relevant Identities via an Ensemble Network | December 2023 | August 2024 | Allow | 9 | 2 | 0 | Yes | No |
| 18519270 | FACILITATING MODIFICATION OF COMPONENTS OF ARTIFICIAL INTELLIGENCE COMPUTING APPLICATIONS VIA AGGREGATED RISK SCORES | November 2023 | January 2026 | Allow | 26 | 1 | 0 | No | No |
| 18520394 | INFORMATION PROCESSING METHOD AND APPARATUS, TERMINAL, AND STORAGE MEDIUM | November 2023 | April 2025 | Allow | 16 | 3 | 0 | Yes | No |
| 18501895 | TECHNIQUES TO PROCESS THREE-DIMENSIONAL OBJECT FILES WHILE MAINTAINING PRIVACY | November 2023 | January 2026 | Allow | 26 | 1 | 0 | Yes | No |
| 18499684 | Location Aware Authorization System | November 2023 | December 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18380512 | SYSTEMS AND METHODS FOR PROVIDING NETWORK-BASED PERMISSIONING USING SECURITY NODE HASH IDENTIFIERS | October 2023 | November 2025 | Allow | 25 | 1 | 0 | Yes | No |
| 18376138 | Artificial Intelligence (AI) Based Cloud Architecture Segmentation Leveraging Homomorphic Encryption | October 2023 | October 2025 | Allow | 24 | 1 | 0 | No | No |
| 18478610 | CRYPTOGRAPHIC METHOD TO CERTIFY RETENTION LOCK STATUS FOR AUDITING IN A BACKUP SYSTEM | September 2023 | December 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18283008 | SECURE SEARCH METHOD, SYSTEM THEREOF, APPARATUS THEREOF, ENCRYPTION APPARATUS, SEARCHER TERMINAL, AND PROGRAM | September 2023 | February 2026 | Abandon | 29 | 2 | 0 | No | No |
| 18368572 | MACHINE LEARNING DEVICE, MACHINE LEARNING SYSTEM, AND MACHINE LEARNING METHOD | September 2023 | February 2024 | Allow | 5 | 1 | 0 | No | No |
| 18465859 | OFFLINE PLATFORM INFORMATION TECHNOLOGY CYBER-PHYSICAL RISK MITIGATION | September 2023 | September 2025 | Allow | 24 | 1 | 0 | No | No |
| 18241550 | Timeline Building System | September 2023 | November 2024 | Allow | 15 | 3 | 0 | Yes | No |
| 18456427 | SYSTEMS AND METHODS FOR THE SECURING DATA WHILE IN TRANSIT BETWEEN DISPARATE SYSTEMS AND WHILE AT REST | August 2023 | November 2023 | Allow | 3 | 1 | 0 | No | No |
| 18547421 | ENCRYPTED SCALAR MULTIPLICATION | August 2023 | July 2024 | Allow | 11 | 1 | 1 | Yes | No |
| 18361144 | SYSTEMS AND METHODS FOR PERFORMING VULNERABILITY ASSESSMENT ON PARTIALLY FUNCTIONAL APPLICATIONS | July 2023 | June 2025 | Allow | 23 | 1 | 0 | No | No |
| 18274136 | SECURE COMPUTATION SYSTEM, SECURE COMPUTATION SERVER APPARATUS, SECURE COMPUTATION METHOD, AND SECURE COMPUTATION PROGRAM | July 2023 | November 2025 | Abandon | 27 | 1 | 0 | No | No |
| 18351538 | SECURE MULTI-ENDPOINT CIPHER NEGOTIATION | July 2023 | May 2025 | Allow | 22 | 0 | 0 | No | No |
| 18348747 | Predicting and Quantifying Weaponization of Software Weaknesses | July 2023 | February 2026 | Allow | 32 | 1 | 0 | Yes | No |
| 18340510 | SYSTEMS AND METHODS FOR A DATA-DRIVEN WORKFLOW PLATFORM | June 2023 | August 2024 | Allow | 14 | 2 | 0 | Yes | No |
| 18339690 | APPARATUS AND METHOD FOR MONITORING OF DATA FOR ATTACK DETECTION AND PREVENTION | June 2023 | May 2025 | Allow | 23 | 1 | 0 | No | No |
| 18318882 | DYNAMIC NETWORK RISK PREDICTING METHOD BASED ON A GRAPH NEURAL NETWORK | May 2023 | December 2023 | Allow | 7 | 1 | 0 | No | No |
| 18318945 | INTERACTIVE WEB APPLICATION SCANNING | May 2023 | May 2024 | Allow | 12 | 0 | 0 | Yes | No |
| 18317512 | DEFENSE METHOD OF DEEP LEARNING MODEL AIMING AT ADVERSARIAL ATTACKS | May 2023 | August 2023 | Allow | 3 | 0 | 0 | No | No |
| 18314471 | TRANSACTION DATA PROCESSING METHOD AND APPARATUS, COMPUTER DEVICE AND STORAGE MEDIUM | May 2023 | September 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 18143420 | SECURE ELECTRONIC CIRCUITRY WITH TAMPER DETECTION | May 2023 | February 2025 | Allow | 21 | 1 | 0 | Yes | No |
| 18250809 | FULLY HOMOMORPHIC CRYPTOGRAPHY WITH IMPROVED DATA ITEM REPRESENTATION | April 2023 | January 2024 | Allow | 9 | 1 | 0 | No | No |
| 18303545 | SYSTEMS AND METHODS FOR PERFORMING VULNERABILITY ASSESSMENT ON PARTIALLY FUNCTIONAL APPLICATIONS | April 2023 | July 2023 | Allow | 3 | 0 | 0 | No | No |
| 18295959 | HOMOMORPHIC ENCRYPTION | April 2023 | July 2025 | Allow | 28 | 2 | 0 | No | No |
| 18194891 | TOKEN BASED ONE-TIME PASSWORD SECURITY | April 2023 | September 2025 | Allow | 30 | 3 | 0 | Yes | No |
| 18029030 | REDISTRIBUTION OF SECRET SHARINGS | March 2023 | September 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 18122101 | GRAPHICAL QUERY BUILDER FOR CLOUD DATA ATTACK DETECTION | March 2023 | July 2024 | Allow | 17 | 1 | 0 | Yes | No |
| 18181972 | Data Processing Method Based on Secure Multi-Party Computation, Electronic Device, and Storage Medium | March 2023 | September 2023 | Allow | 6 | 1 | 0 | No | No |
| 18114682 | Copy-and-Recurse Operations for Fully Homomorphic Encrypted Database Query Processing | February 2023 | June 2025 | Allow | 28 | 1 | 0 | No | No |
| 18113803 | FLEXIBLE RISK ASSESSMENT AND MANAGEMENT SYSTEM FOR INTEGRATED RISK AND VALUE ANALYSIS | February 2023 | January 2026 | Allow | 34 | 3 | 0 | Yes | No |
| 18172998 | METHOD AND SYSTEM FOR CONFIDENTIAL REPOSITORY SEARCHING AND RETRIEVAL | February 2023 | August 2023 | Allow | 5 | 1 | 0 | Yes | No |
| 18111096 | SYSTEM AND METHOD FOR SECURING DATA FILES | February 2023 | January 2024 | Allow | 11 | 1 | 0 | Yes | No |
| 18167490 | Private Information Retrieval with Sublinear Public-Key Operations | February 2023 | July 2024 | Allow | 17 | 1 | 0 | Yes | No |
| 18165693 | SYSTEMS AND METHODS FOR LINKING REMOTE FILE STORAGE | February 2023 | October 2025 | Allow | 33 | 2 | 0 | Yes | No |
| 18089646 | CONTINUOUS RISK ASSESSMENT FOR ELECTRONIC PROTECTED HEALTH INFORMATION | December 2022 | August 2024 | Allow | 19 | 1 | 0 | No | No |
| 18145790 | MALICIOUS ENTERPRISE BEHAVIOR DETECTION TOOL | December 2022 | October 2024 | Allow | 22 | 2 | 0 | Yes | No |
| 18068470 | SECURE COMMUNICATION SESSION RESUMPTION IN A SERVICE FUNCTION CHAIN | December 2022 | March 2024 | Allow | 15 | 1 | 0 | Yes | No |
| 18080294 | THIRD PARTY BIOMETRIC HOMOMORPHIC ENCRYPTION MATCHING FOR PRIVACY PROTECTION | December 2022 | October 2023 | Allow | 10 | 2 | 0 | No | No |
| 18080416 | METHOD FOR TRAINING MODEL BASED ON HOMOMORPHIC ENCRYPTION, DEVICE, AND STORAGE MEDIUM | December 2022 | October 2023 | Abandon | 10 | 1 | 0 | No | No |
| 18009048 | MANAGEMENT DEVICE, ENCRYPTION TERMINAL, USER TERMINAL, ENCRYPTION SYSTEM, MANAGEMENT METHOD, ENCRYPTION METHOD, AND COMPUTER-READABLE MEDIUM | December 2022 | November 2025 | Abandon | 35 | 2 | 0 | No | No |
| 18075091 | METHODS AND SYSTEMS FOR EVALUATING EFFECTS OF CYBER ATTACKS ON CYBER-PHYSICAL SYSTEMS | December 2022 | January 2025 | Allow | 26 | 2 | 0 | Yes | No |
| 18074260 | ADVERSARIAL ATTACK PREVENTION AND MALWARE DETECTION SYSTEM | December 2022 | February 2025 | Abandon | 27 | 2 | 0 | Yes | No |
| 18052747 | Method and System for Detecting Two-Factor Authentication | November 2022 | March 2024 | Allow | 17 | 1 | 0 | Yes | No |
| 18050398 | APPARATUS AND METHOD FOR MONITORING OF DATA FOR ATTACK DETECTION AND PREVENTION | October 2022 | May 2023 | Allow | 7 | 1 | 0 | No | No |
| 17967570 | APPARATUS AND METHODS FOR VERIFYING LOST USER DATA | October 2022 | August 2024 | Allow | 22 | 1 | 0 | No | No |
| 17963886 | APPARATUS AND METHOD FOR PROVIDING CYBER SECURITY DEFENSE IN DIGITAL ENVIRONMENTS | October 2022 | September 2023 | Allow | 11 | 4 | 0 | Yes | No |
| 17937026 | ENHANCED ENCRYPTION FOR FACE-RELATED DATA | September 2022 | March 2024 | Allow | 17 | 1 | 0 | No | No |
| 17936770 | LOGGING FROM USER-DEFINED FUNCTIONS | September 2022 | March 2024 | Allow | 17 | 1 | 0 | No | No |
| 17956001 | BIOMETRIC DATA SECURITY SYSTEM AND METHOD | September 2022 | December 2023 | Allow | 14 | 1 | 0 | No | No |
| 17952550 | Product Traceability Processing | September 2022 | July 2024 | Allow | 21 | 1 | 1 | Yes | No |
| 17932405 | TRAINING METHOD AND APPARATUS FOR A DISTRIBUTED MACHINE LEARNING MODEL AND MEDIUM | September 2022 | June 2023 | Allow | 9 | 1 | 0 | No | No |
| 17939489 | CLOUD DATA ATTACK DETECTION QUERY BUILDER | September 2022 | November 2022 | Allow | 2 | 0 | 0 | Yes | No |
| 17929676 | INTELLIGENT VULNERABILITY LIFECYCLE MANAGEMENT SYSTEM | September 2022 | May 2024 | Allow | 20 | 1 | 0 | No | No |
| 17887027 | TWO-DIMENSIONALITY DETECTION METHOD FOR INDUSTRIAL CONTROL SYSTEM ATTACKS | August 2022 | March 2023 | Allow | 7 | 1 | 0 | No | No |
| 17885330 | SOFTWARE VULNERABILITY DETECTION IN MANAGED NETWORKS | August 2022 | April 2024 | Allow | 20 | 2 | 0 | Yes | No |
| 17882929 | SYSTEM AND METHOD FOR SENDING AND/OR RECEIVING ENTROPY AND ENTROPY EXPANSION | August 2022 | October 2024 | Allow | 26 | 1 | 1 | Yes | No |
| 17872447 | SYSTEM AND METHOD FOR EXECUTING DATA ACCESS TRANSACTION | July 2022 | July 2024 | Abandon | 23 | 1 | 0 | No | No |
| 17868894 | SYSTEM AND METHOD FOR EXECUTING DATA ACCESS TRANSACTION | July 2022 | July 2024 | Abandon | 23 | 1 | 0 | No | No |
| 17862504 | System, Method, and Computer Program Product for Maintaining User Privacy in Advertisement Networks | July 2022 | October 2023 | Allow | 16 | 1 | 0 | No | No |
| 17810666 | SYSTEM AND METHOD FOR FACILITATING DISTRIBUTED PEER TO PEER STORAGE OF DATA | July 2022 | January 2023 | Allow | 6 | 0 | 0 | No | No |
| 17840848 | CLUSTER SECURITY BASED ON VIRTUAL MACHINE CONTENT | June 2022 | April 2025 | Allow | 34 | 3 | 0 | Yes | No |
| 17785235 | SIMULATION DEVICE AND METHOD FOR HOMOMORPHIC CRYPTOSYSTEM | June 2022 | July 2023 | Allow | 13 | 0 | 0 | Yes | No |
| 17738666 | LARGE-WORD APPROXIMATE HOMOMORPHIC ENCRYPTION | May 2022 | September 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17735101 | SYSTEMS AND METHODS FOR IMPLEMENTING CYBERSECURITY USING BLOCKCHAIN VALIDATION | May 2022 | November 2023 | Allow | 19 | 1 | 0 | No | No |
| 17735087 | DATA STRUCTURE FOR TRUST STORE | May 2022 | July 2023 | Allow | 14 | 1 | 0 | No | No |
| 17716424 | ENHANCED ENCRYPTION FOR FACE-RELATED DATA | April 2022 | June 2022 | Allow | 3 | 0 | 0 | No | No |
| 17715075 | Adaptive Cyber-Attack Emulation | April 2022 | October 2022 | Allow | 6 | 2 | 0 | Yes | No |
| 17709673 | Entity Behavior Catalog Architecture | March 2022 | June 2023 | Allow | 14 | 1 | 0 | No | No |
| 17695049 | APPARATUS AND METHODS FOR VERIFYING LOST USER DATA | March 2022 | June 2022 | Allow | 3 | 0 | 0 | No | No |
| 17691474 | SECURING SOFTWARE PACKAGE COMPOSITION INFORMATION | March 2022 | March 2024 | Allow | 25 | 1 | 0 | Yes | No |
| 17688878 | SYSTEMS AND METHODS FOR IMPLEMENTING CYBERSECURITY USING TRUST BINARIES | March 2022 | April 2025 | Allow | 38 | 3 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LI, MENG.
With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 33.3% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner LI, MENG works in Art Unit 2437 and has examined 456 patent applications in our dataset. With an allowance rate of 90.6%, this examiner has an above-average tendency to allow applications. Applications typically reach final disposition in approximately 26 months.
Examiner LI, MENG's allowance rate of 90.6% places them in the 74% percentile among all USPTO examiners. This examiner has an above-average tendency to allow applications.
On average, applications examined by LI, MENG receive 1.75 office actions before reaching final disposition. This places the examiner in the 38% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by LI, MENG is 26 months. This places the examiner in the 75% percentile for prosecution speed. Applications move through prosecution relatively quickly with this examiner.
Conducting an examiner interview provides a +16.4% benefit to allowance rate for applications examined by LI, MENG. This interview benefit is in the 57% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 34.7% of applications are subsequently allowed. This success rate is in the 77% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 26.4% of cases where such amendments are filed. This entry rate is in the 37% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 142.9% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 88% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences are highly effective with this examiner compared to others. Before filing a full appeal brief, strongly consider requesting a PAC. The PAC provides an opportunity for the examiner and supervisory personnel to reconsider the rejection before the case proceeds to the PTAB.
This examiner withdraws rejections or reopens prosecution in 75.0% of appeals filed. This is in the 64% percentile among all examiners. Of these withdrawals, 77.8% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows above-average willingness to reconsider rejections during appeals. The mandatory appeal conference (MPEP § 1207.01) provides an opportunity for reconsideration.
When applicants file petitions regarding this examiner's actions, 22.2% are granted (fully or in part). This grant rate is in the 11% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 14% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.5% of allowed cases (in the 55% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.