Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 17081810 | APPARATUS AND METHOD FOR PREVENTING SIDE CHANNEL ATTACK FOR NTRU LPRime ALGORITHM | February 2021 | October 2023 | Allow | 36 | 2 | 0 | No | No |
| 17138851 | RECORD MANAGEMENT APPARATUS | December 2020 | May 2024 | Abandon | 40 | 4 | 0 | No | No |
| 17136586 | METHOD AND APPARATUS FOR REGISTERING DEVICE IN CLOUD SERVER | December 2020 | December 2023 | Allow | 36 | 3 | 0 | Yes | No |
| 17118837 | REMOTE MANAGEMENT OF HARDWARE SECURITY MODULES | December 2020 | September 2024 | Allow | 45 | 4 | 0 | Yes | No |
| 17114318 | SECURING DATA IN MULTITENANT ENVIRONMENT | December 2020 | March 2023 | Allow | 27 | 2 | 0 | Yes | No |
| 17109795 | HOMOMORPHIC ENCRYPTION OFFLOAD FOR LIGHTWEIGHT DEVICES | December 2020 | October 2022 | Allow | 23 | 1 | 0 | No | No |
| 17107090 | SYSTEM AND METHOD OF SYNCHRONIZING A DISTRIBUTED CLOCK IN A PACKET-COMPATIBLE NETWORK | November 2020 | April 2024 | Allow | 41 | 3 | 0 | Yes | No |
| 17104578 | MACHINE LEARNING FOR DOCUMENT AUTHENTICATION | November 2020 | December 2023 | Abandon | 37 | 3 | 0 | Yes | No |
| 16952918 | APPLICATION PROGRAMMING INTERFACES FOR NOTEBOOK SETTINGS | November 2020 | June 2022 | Allow | 19 | 0 | 0 | No | No |
| 17089895 | OFFLINE MULTI-FACTOR ONE-TIME PASSWORD AUTHENTICATION | November 2020 | October 2024 | Abandon | 48 | 3 | 0 | Yes | No |
| 17083515 | VALIDATION OF TRANSACTION LEDGER CONTENT USING JAVA SCRIPT OBJECT NOTATION SCHEMA DEFINITION | October 2020 | June 2024 | Abandon | 44 | 4 | 0 | No | No |
| 17048630 | SECURE CONNECTION | October 2020 | September 2023 | Abandon | 35 | 4 | 0 | No | No |
| 17029410 | DATA PROCESSING METHOD, CIRCUIT, TERMINAL DEVICE AND STORAGE MEDIUM | September 2020 | September 2023 | Abandon | 35 | 2 | 0 | Yes | No |
| 16981046 | HEARING SYSTEM, THREAT RESPONSE SYSTEM, METHOD, AND PROGRAM | September 2020 | September 2024 | Abandon | 48 | 2 | 0 | No | No |
| 16980841 | INTERNET OF THINGS DEVICES FOR USE WITH AN ENCRYPTION SERVICE | September 2020 | January 2023 | Abandon | 28 | 2 | 0 | No | No |
| 16985550 | PASSTHROUGH MOBILE APPLICATION POLICY | August 2020 | February 2023 | Allow | 30 | 1 | 0 | No | No |
| 16938349 | System for Interexchange of State Data Among Disparate Block Chains | July 2020 | February 2022 | Allow | 19 | 0 | 0 | No | No |
| 16930563 | DATA DECRYPTION METHOD AND APPARATUS, AND ELECTRONIC DEVICE | July 2020 | January 2023 | Abandon | 30 | 2 | 0 | No | No |
| 16930758 | VEHICULAR FIREWALL PROVISION DEVICE | July 2020 | June 2022 | Abandon | 23 | 1 | 0 | No | No |
| 16961552 | DATA MANAGEMENT DEVICE, DATA MANAGEMENT METHOD, AND COMPUTER READABLE MEDIUM | July 2020 | August 2023 | Abandon | 37 | 2 | 0 | Yes | No |
| 16924919 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROTECTING CONFIDENTIAL INTEGRATED CIRCUIT DESIGN | July 2020 | April 2023 | Allow | 33 | 3 | 0 | No | No |
| 16918144 | METHOD FOR EXECUTING A BINARY CODE OF A SECURE FUNCTION WITH A MICROPROCESSOR | July 2020 | September 2021 | Allow | 15 | 0 | 0 | No | No |
| 16912482 | MOVING TARGET AUTHENTICATION PROTOCOLS | June 2020 | May 2022 | Allow | 22 | 2 | 0 | Yes | No |
| 16910530 | METHOD AND SYSTEM FOR SSIS PASSWORD MANAGEMENT INTEGRATION | June 2020 | July 2022 | Allow | 24 | 1 | 0 | Yes | No |
| 16910010 | SYSTEMS FOR GENERATING AND MANAGING CERTIFICATE AUTHORITIES | June 2020 | August 2022 | Allow | 25 | 1 | 0 | Yes | No |
| 16772543 | SECRET COMPUTATION SYSTEM AND METHOD | June 2020 | September 2022 | Allow | 27 | 2 | 0 | Yes | No |
| 16899536 | SECURE OPTICAL COMMUNICATION LINK | June 2020 | April 2023 | Allow | 34 | 2 | 0 | Yes | No |
| 16897695 | DEFINING AND USING SERVICE RULES THAT REFERENCE ENDPOINT GROUP IDENTIFIERS | June 2020 | January 2023 | Allow | 31 | 2 | 0 | No | No |
| 16890046 | DATA COMPARISON DEVICE, DATA COMPARISON SYSTEM, AND DATA COMPARISON METHOD | June 2020 | December 2023 | Allow | 43 | 3 | 0 | No | No |
| 16890584 | METHOD FOR PROVISION OF IDENTITY VERIFICATION CERTIFICATE | June 2020 | August 2022 | Allow | 26 | 2 | 0 | Yes | No |
| 16888885 | SYSTEMS AND METHODS FOR PROTECTING NEURAL NETWORK WEIGHTS | June 2020 | July 2022 | Allow | 25 | 0 | 0 | Yes | No |
| 16766253 | SERVING-NETWORK BASED PERFECT FORWARD SECURITY FOR AUTHENTICATION | May 2020 | June 2023 | Allow | 37 | 4 | 0 | Yes | No |
| 16872924 | Method and System for Providing a Brain Computer Interface | May 2020 | September 2021 | Allow | 16 | 1 | 0 | No | No |
| 16870982 | De-identified Identity Proofing Methods and Systems | May 2020 | March 2024 | Abandon | 47 | 4 | 1 | No | No |
| 16758408 | COMMUNICATION DEVICE, COMMUNICATION SYSTEM, AND RECORDING MEDIUM | April 2020 | March 2022 | Allow | 23 | 1 | 0 | No | No |
| 16852280 | BUILDING RESILIENT MODELS TO ADDRESS DYNAMIC CUSTOMER DATA USE RIGHTS | April 2020 | March 2023 | Allow | 34 | 4 | 0 | No | No |
| 16831356 | SCALABLE TWEAK ENGINES AND PREFETCHED TWEAK VALUES FOR ENCYRPTION ENGINES | March 2020 | October 2024 | Allow | 54 | 6 | 0 | Yes | Yes |
| 16825068 | Applying Attestation to the Border Gateway Protocol (BGP) | March 2020 | August 2023 | Allow | 41 | 5 | 0 | Yes | No |
| 16823441 | METHOD FOR EXECUTING, WITH A MICROPROCESSOR, A BINARY CODE CONTAINING A CALLING FUNCTION AND A CALLED FUNCTION | March 2020 | June 2023 | Abandon | 39 | 2 | 0 | Yes | No |
| 16824093 | METHOD AND SYSTEM FOR SECURE BLOCKCHAIN-BASED VEHICULAR DIGITAL FORENSICS | March 2020 | October 2021 | Allow | 19 | 0 | 0 | No | No |
| 16820122 | METHOD FOR ENCRYPTION AND DECRYPTION, PROGRAMMABLE SWITCH AND COMPUTER PROGRAM PRODUCT | March 2020 | February 2023 | Allow | 35 | 4 | 0 | Yes | Yes |
| 16815436 | Configuring Networked Devices Sharing a Common Firmware Key | March 2020 | July 2023 | Allow | 40 | 4 | 0 | Yes | No |
| 16810962 | SELF-CONTAINED ENCRYPTED DATA AND DECRYPTION APPLICATION FOR THIRD PARTY DATA STORAGE AND DATA DISSEMINATION | March 2020 | January 2024 | Allow | 46 | 4 | 0 | Yes | No |
| 16805920 | PROVIDING CASCADING QUANTUM ENCRYPTION SERVICES IN QUANTUM COMPUTING SYSTEMS | March 2020 | July 2023 | Allow | 40 | 3 | 0 | Yes | No |
| 16800807 | SYSTEMS AND METHODS FOR PREVENTING DENIAL OF SERVICE ATTACKS UTILIZING A PROXY SERVER | February 2020 | September 2021 | Allow | 19 | 1 | 0 | No | No |
| 16773726 | SYSTEM FOR INFORMATION SECURITY THREAT ASSESSMENT BASED ON DATA HISTORY | January 2020 | May 2021 | Allow | 16 | 0 | 0 | No | No |
| 16751792 | HOMOMORPHIC COMPUTATIONS ON ENCRYPTED DATA WITHIN A DISTRIBUTED COMPUTING ENVIRONMENT | January 2020 | June 2022 | Allow | 28 | 2 | 0 | Yes | No |
| 16743868 | DATA STORAGE METHOD, DEVICE, RELATED EQUIPMENT AND CLOUD SYSTEM FOR HYBRID CLOUD | January 2020 | September 2022 | Allow | 32 | 3 | 0 | Yes | No |
| 16742801 | DATA ANALYSIS SYSTEM AND DATA ANALYSIS METHOD | January 2020 | April 2022 | Allow | 27 | 2 | 0 | No | No |
| 16738106 | ACTIVATING OR DEACTIVATING A FEATURE OF A VEHICLE | January 2020 | September 2022 | Abandon | 32 | 2 | 0 | Yes | No |
| 16718960 | SECURITY SETTLEMENT USING GROUP SIGNATURES | December 2019 | June 2022 | Allow | 30 | 2 | 0 | Yes | No |
| 16718460 | INTEGRITY PROTECTED COMMAND BUFFER EXECUTION | December 2019 | July 2022 | Allow | 31 | 3 | 0 | No | No |
| 16719682 | SECURITY SETTLEMENT USING GROUP SIGNATURES | December 2019 | July 2022 | Allow | 31 | 2 | 0 | Yes | No |
| 16716155 | DYNAMIC ENCRYPTED ON-DEVICE STORAGE FOR SESSION QUALITY-AGNOSTIC MOBILE BUG EVIDENCE PRESERVATION | December 2019 | March 2024 | Allow | 51 | 4 | 0 | Yes | No |
| 16614548 | WIRELESS AUTHENTICATION SYSTEMS | November 2019 | June 2023 | Allow | 43 | 3 | 0 | No | No |
| 16667468 | SYSTEMS AND METHODS FOR USE IN MANAGING ACCESS TO USER PROFILES, AND CONTENT BLOCKS INCLUDED THEREIN | October 2019 | September 2021 | Allow | 22 | 1 | 0 | No | No |
| 16659008 | USER IDENTITY AUTHENTICATION USING VIRTUAL REALITY | October 2019 | September 2021 | Allow | 22 | 1 | 0 | Yes | No |
| 16591774 | METHODS AND SYSTEMS FOR SECURING VPN CLOUD SERVERS | October 2019 | September 2021 | Allow | 24 | 2 | 0 | No | No |
| 16582035 | FRAUD PREVENTION METHOD FOR INFORMATION PROCESSING DEVICE | September 2019 | December 2021 | Abandon | 26 | 1 | 0 | No | No |
| 16569284 | Automated Certificate Management for Automation Installations | September 2019 | January 2022 | Abandon | 28 | 1 | 0 | No | No |
| 16564527 | ENCRYPTION FOR MACHINE LEARNING MODEL INPUTS | September 2019 | August 2022 | Abandon | 35 | 1 | 0 | Yes | No |
| 16507395 | LAYOUT-INDEPENDENT CRYPTOGRAPHIC STAMP OF A DISTRIBUTED DATASET | July 2019 | March 2021 | Allow | 21 | 0 | 0 | Yes | No |
| 16459373 | DATA STREAM IDENTITY | July 2019 | December 2020 | Allow | 18 | 2 | 0 | Yes | No |
| 16442722 | Secure Memory Read | June 2019 | February 2025 | Abandon | 60 | 5 | 0 | Yes | Yes |
| 16426851 | PARTIAL-CONTEXT POLICY ENFORCEMENT | May 2019 | February 2021 | Allow | 21 | 0 | 0 | No | No |
| 16282491 | MEMORY SYSTEM AND METHOD OF CONTROLLING NONVOLATILE MEMORY | February 2019 | January 2023 | Allow | 47 | 2 | 0 | Yes | No |
| 16271258 | ENHANCED SECURITY FOR MULTIPLE NODE COMPUTING PLATFORM | February 2019 | August 2023 | Abandon | 54 | 2 | 0 | Yes | No |
| 16270521 | Method and System of Implementing Security Algorithm and Decryption Algorithm by Using Reconfigurable Processor | February 2019 | September 2020 | Allow | 20 | 2 | 0 | No | No |
| 16220412 | SELF-PROVISIONING AND PROTECTION OF A SECRET KEY | December 2018 | December 2021 | Abandon | 36 | 2 | 0 | No | No |
| 16212444 | UPDATING SECURITY CONTROLS OR POLICIES BASED ON ANALYSIS OF COLLECTED OR CREATED METADATA | December 2018 | July 2021 | Allow | 31 | 2 | 0 | Yes | No |
| 16088338 | SECURE COMMUNICATION METHOD AND APPARATUS FOR VEHICLE, MULTIMEDIA SYSTEM FOR VEHICLE, AND VEHICLE | September 2018 | March 2021 | Allow | 30 | 1 | 0 | No | No |
| 16082259 | COMPUTER SYSTEM | September 2018 | September 2020 | Allow | 24 | 2 | 0 | No | No |
| 16025416 | UNIFIED AUTHENTICATION SOFTWARE DEVELOPMENT KIT | July 2018 | October 2020 | Allow | 28 | 2 | 0 | Yes | No |
| 16067574 | Systems and Method for Retroactive Assignment of Personally Identifiable Information in Distribution of Digital Content | June 2018 | February 2021 | Abandon | 32 | 1 | 0 | No | No |
| 16014418 | SECURITY MANAGEMENT FOR SERVICE AUTHORIZATION IN COMMUNICATION SYSTEMS WITH SERVICE-BASED ARCHITECTURE | June 2018 | November 2020 | Allow | 29 | 1 | 0 | Yes | No |
| 16061264 | ENCRYPTION DEVICE, ENCRYPTION METHOD, COMPUTER READABLE MEDIUM, AND STORAGE DEVICE | June 2018 | February 2021 | Allow | 32 | 1 | 0 | No | No |
| 15993366 | Machine Learning for Document Authentication | May 2018 | September 2020 | Allow | 27 | 1 | 0 | Yes | No |
| 15990987 | SECURE SYSTEM ON CHIP FOR PROTECTING SOFTWARE PROGRAM FROM TAMPERING, REHOSTING AND PIRACY AND METHOD FOR OPERATING THE SAME | May 2018 | May 2021 | Abandon | 36 | 2 | 0 | No | No |
| 15991037 | SECURE RE-ENROLLMENT OF BIOMETRIC TEMPLATES USING FUNCTIONAL ENCRYPTION | May 2018 | August 2020 | Allow | 27 | 1 | 0 | Yes | No |
| 15987894 | SYSTEM AND METHOD FOR ENCRYPTING AND COMPRESSING BLOCKS OF DATA | May 2018 | January 2021 | Allow | 32 | 1 | 0 | No | No |
| 15987631 | MAINTAINING SESSION STICKINESS ACROSS AUTHENTICATION AND AUTHORIZATION CHANNELS FOR ACCESS MANAGEMENT | May 2018 | April 2021 | Allow | 35 | 2 | 0 | Yes | No |
| 15986734 | LOCALLY PRIVATE DETERMINATION OF HEAVY HITTERS | May 2018 | January 2021 | Allow | 32 | 1 | 0 | No | No |
| 15983594 | AUTOMOTIVE NONCE-MISUSE-RESISTANT AUTHENTICATED ENCRYPTION | May 2018 | August 2020 | Allow | 27 | 1 | 0 | Yes | No |
| 15982844 | PAIRING WITH COMPANION DEVICE | May 2018 | November 2020 | Allow | 30 | 2 | 0 | Yes | No |
| 15948198 | METHOD AND SYSTEM FOR APPLYING COMPLIANCE POLICIES ON PRIVATE AND PUBLIC CLOUD | April 2018 | August 2020 | Allow | 29 | 1 | 0 | No | No |
| 15948100 | KEYSTREAM GENERATION USING MEDIA DATA | April 2018 | July 2021 | Allow | 39 | 3 | 0 | Yes | No |
| 15941593 | Distributed System for Adaptive Protection Against Web-Service-Targeted Vulnerability Scanners | March 2018 | September 2020 | Allow | 29 | 1 | 0 | No | No |
| 15938615 | SYSTEM AND METHOD THEREOF FOR CONTEXTUAL CUSTOMIZATION OF NOTIFICATIONS | March 2018 | December 2020 | Abandon | 32 | 1 | 0 | No | No |
| 15874698 | Join Operations on Encrypted Database Tables | January 2018 | May 2020 | Allow | 27 | 1 | 0 | Yes | No |
| 15859950 | WATERMARKING ANONYMIZED DATASETS BY ADDING DECOYS | January 2018 | December 2020 | Allow | 36 | 2 | 0 | No | No |
| 15859780 | SECURE CLIENT AUTHENTICATION BASED ON CONDITIONAL PROVISIONING OF CODE SIGNATURE | January 2018 | May 2020 | Allow | 29 | 2 | 0 | Yes | No |
| 15835765 | PREVENTION OF MALICIOUS AUTOMATION ATTACKS ON A WEB SERVICE | December 2017 | June 2022 | Allow | 54 | 5 | 0 | No | No |
| 15830532 | IMAGE PROCESSING APPARATUS, METHOD OF NOTIFICATION OF THE NUMBER OF IC CARD PROCESSES FOR THE IMAGE PROCESSING APPARATUS, AND RECORDING MEDIUM | December 2017 | May 2021 | Abandon | 41 | 3 | 0 | Yes | No |
| 15827300 | METHOD AND APPARATUS FOR REGISTERING DEVICE IN CLOUD SERVER | November 2017 | September 2020 | Allow | 34 | 3 | 0 | Yes | No |
| 15827292 | SYSTEM FOR GENERATING A COMMUNICATION PATHWAY FOR THIRD PARTY VULNERABILITY MANAGEMENT | November 2017 | October 2020 | Allow | 34 | 2 | 0 | No | No |
| 15827094 | SYSTEM FOR INFORMATION SECURITY THREAT ASSESSMENT BASED ON DATA HISTORY | November 2017 | December 2019 | Allow | 25 | 1 | 0 | No | No |
| 15827171 | MULTICOMPUTER PROCESSING FOR DATA AUTHENTICATION AND EVENT EXECUTION USING A BLOCKCHAIN APPROACH | November 2017 | June 2021 | Allow | 43 | 3 | 0 | Yes | No |
| 15827211 | ENTITY RESOLUTION-BASED MALICIOUS FILE DETECTION | November 2017 | May 2020 | Allow | 29 | 1 | 0 | Yes | No |
| 15827097 | SYSTEM FOR RECURRING INFORMATION SECURITY THREAT ASSESSMENT | November 2017 | September 2020 | Allow | 34 | 2 | 0 | Yes | No |
| 15825978 | IN-VEHICLE APPARATUS FOR EFFICIENT REPROGRAMMING AND CONTROLLING METHOD THEREOF | November 2017 | September 2021 | Allow | 46 | 4 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner TAFAGHODI, ZOHA PIYADEHGHIBI.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 42.9% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner TAFAGHODI, ZOHA PIYADEHGHIBI works in Art Unit 2437 and has examined 155 patent applications in our dataset. With an allowance rate of 78.7%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 32 months.
Examiner TAFAGHODI, ZOHA PIYADEHGHIBI's allowance rate of 78.7% places them in the 49% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by TAFAGHODI, ZOHA PIYADEHGHIBI receive 2.13 office actions before reaching final disposition. This places the examiner in the 53% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by TAFAGHODI, ZOHA PIYADEHGHIBI is 32 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +14.1% benefit to allowance rate for applications examined by TAFAGHODI, ZOHA PIYADEHGHIBI. This interview benefit is in the 51% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 33.2% of applications are subsequently allowed. This success rate is in the 72% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 12.3% of cases where such amendments are filed. This entry rate is in the 14% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 80.0% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 64% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 100.0% of appeals filed. This is in the 89% percentile among all examiners. Of these withdrawals, 75.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner frequently reconsiders rejections during the appeal process compared to other examiners. Per MPEP § 1207.01, all appeals must go through a mandatory appeal conference. Filing a Notice of Appeal may prompt favorable reconsideration even before you file an Appeal Brief.
When applicants file petitions regarding this examiner's actions, 0.0% are granted (fully or in part). This grant rate is in the 2% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 15% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 18% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.