Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 17135487 | SYSTEM AND METHOD FOR VERIFYING USER BY SECURITY TOKEN COMBINED WITH BIOMETRIC DATA PROCESSING TECHNIQUES | December 2020 | February 2023 | Allow | 26 | 0 | 0 | No | No |
| 17105299 | FORK TABLE OF AN AUTHENTICATED INDEX DATA STRUCTURE | November 2020 | July 2022 | Allow | 20 | 0 | 0 | Yes | No |
| 17105207 | AUTHENTICATED INDEX DATA STRUCTURE WITH BACK-POINTERS | November 2020 | April 2023 | Allow | 29 | 1 | 0 | Yes | No |
| 17094387 | LEDGER-BASED ARTIFICIAL INTELLIGENCE DATA STORING | November 2020 | February 2023 | Allow | 27 | 1 | 0 | No | No |
| 17091617 | System and Methods for Computation, Storage, and Consensus in Distributed Systems | November 2020 | March 2023 | Allow | 28 | 1 | 0 | No | No |
| 17052214 | SECURE CROSS TABULATION SYSTEM, SECURE COMPUTATION APPARATUS, SECURE CROSS TABULATION METHOD, AND PROGRAM | November 2020 | August 2023 | Allow | 34 | 1 | 0 | Yes | No |
| 17072144 | ENSURING THE INTEGRITY OF DATA STORED IN A MEMORY BY USING A WATERMARK | October 2020 | January 2023 | Allow | 27 | 1 | 0 | Yes | No |
| 17062176 | SYSTEM HAVING TRACKER DATA VALIDATION | October 2020 | January 2023 | Allow | 27 | 1 | 0 | No | No |
| 17060238 | INTELLIGENT TACTILE RESOURCE INSTRUMENT ACTIVATION USING ELECTROENCEPHALOGRAM SIGNALS | October 2020 | January 2024 | Allow | 40 | 3 | 0 | No | No |
| 17032041 | BLOCKCHAIN-BASED TIME STAMPING METHOD FOR DIGITAL SIGNATURE | September 2020 | November 2023 | Allow | 38 | 2 | 1 | No | No |
| 16979145 | BLOCKCHAIN-IMPLEMENTED METHODS AND SYSTEMS FOR AUTHORISATION BASED ON BILINEAR MAP ACCUMULATORS | September 2020 | June 2023 | Allow | 33 | 2 | 0 | No | No |
| 17005941 | Public/Private Key Biometric Authentication System | August 2020 | September 2023 | Allow | 37 | 3 | 0 | Yes | No |
| 16872683 | MINING MACHINE AND METHOD FOR LIMITING COMPUTING POWER | May 2020 | April 2022 | Allow | 23 | 0 | 0 | No | No |
| 16863806 | LARGE SCALE MALWARE SAMPLE IDENTIFICATION | April 2020 | November 2022 | Allow | 31 | 1 | 0 | Yes | No |
| 16650389 | METHOD FOR SIGNING A NEW BLOCK IN A DECENTRALIZED BLOCKCHAIN CONSENSUS NETWORK | March 2020 | April 2023 | Allow | 36 | 2 | 1 | No | No |
| 16820428 | UPDATE MANAGEMENT METHOD, UPDATE MANAGEMENT SYSTEM, AND NON-TRANSITORY RECORDING MEDIUM | March 2020 | November 2021 | Allow | 20 | 0 | 0 | No | No |
| 16634809 | EMAIL INSPECTION DEVICE, EMAIL INSPECTION METHOD, AND COMPUTER READABLE MEDIUM | January 2020 | May 2023 | Abandon | 39 | 2 | 0 | No | No |
| 16752592 | METHOD FOR DISTRIBUTED AND SECURE TIMEKEEPING | January 2020 | April 2022 | Allow | 27 | 1 | 0 | Yes | No |
| 16747796 | DATA ACCESS CONTROL FOR EDGE DEVICES USING A CRYPTOGRAPHIC HASH | January 2020 | April 2023 | Allow | 38 | 3 | 0 | Yes | No |
| 16622155 | INFORMATION MANAGEMENT SYSTEM WITH BLOCKCHAIN AUTHENTICATION | December 2019 | March 2022 | Allow | 27 | 3 | 0 | No | No |
| 16615801 | TRUSTLESS DETERMINISTIC STATE MACHINE | November 2019 | May 2022 | Allow | 30 | 0 | 0 | No | No |
| 16613821 | DIGITAL COMPOSITION HASHING | November 2019 | March 2022 | Allow | 27 | 1 | 0 | No | No |
| 16674379 | INFORMATION PROCESSING SYSTEM, METHOD FOR PROVIDING DATA, AND METHOD FOR BUILDING INFORMATION PROCESSING SYSTEM | November 2019 | June 2023 | Abandon | 44 | 2 | 0 | No | No |
| 16669962 | METHODS AND SYSTEMS FOR TRACKING OWNERSHIP OF GOODS WITH A BLOCKCHAIN | October 2019 | October 2023 | Allow | 47 | 4 | 0 | Yes | No |
| 16657890 | BLOCKCHAIN ACCOUNT MIGRATION | October 2019 | March 2022 | Allow | 29 | 1 | 0 | Yes | No |
| 16603151 | EVALUATION APPARATUS, EVALUATION METHOD, AND COMPUTER READABLE MEDIUM | October 2019 | February 2023 | Abandon | 41 | 1 | 0 | No | No |
| 16498134 | HASH VALUES FOR A BIDIRECTIONALLY LINKED BLOCKCHAIN | September 2019 | January 2022 | Allow | 28 | 1 | 0 | Yes | No |
| 16572675 | PREVENTING SELECTIVE EVENTS OF A COMPUTING ENVIRONMENT | September 2019 | May 2022 | Allow | 32 | 2 | 0 | Yes | No |
| 16568590 | COMPUTER SYSTEM AND DEVICE MANAGEMENT METHOD | September 2019 | November 2021 | Allow | 26 | 1 | 0 | Yes | No |
| 16566717 | TIME-CONSTRAINED AUTHENTICATION | September 2019 | April 2023 | Abandon | 43 | 2 | 0 | Yes | No |
| 16491816 | INFORMATION PROCESSING APPARATUS AND METHOD FOR PROCESSING INFORMATION | September 2019 | September 2022 | Allow | 36 | 3 | 0 | Yes | No |
| 16559935 | CACHE LINE CLEANUP FOR PREVENTION OF SIDE CHANNEL ATTACK | September 2019 | October 2021 | Allow | 25 | 1 | 0 | Yes | No |
| 16524692 | TECHNIQUES FOR SECURING DIGITAL SIGNATURES USING MULTI-PARTY COMPUTATION | July 2019 | February 2023 | Allow | 43 | 4 | 0 | Yes | No |
| 16479672 | METHOD AND APPARATUS FOR THE COMPUTER-AIDED CREATION AND EXECUTION OF A CONTROL FUNCTION | July 2019 | June 2022 | Abandon | 35 | 1 | 0 | No | No |
| 16476649 | COMPACT RECORDATION PROTOCOL | July 2019 | January 2023 | Allow | 42 | 4 | 0 | Yes | No |
| 16504575 | AUTHENTICATED BOOT TO PROTECT STORAGE SYSTEM DATA BY RESTRICTING IMAGE DEPLOYMENT | July 2019 | June 2022 | Allow | 35 | 3 | 0 | No | No |
| 16447865 | System and Method for Bitcoin Mining with Reduced Power | June 2019 | February 2023 | Allow | 44 | 5 | 0 | Yes | Yes |
| 16442472 | SCALABLE, SECURE, EFFICIENT, AND ADAPTABLE DISTRIBUTED DIGITAL LEDGER TRANSACTION NETWORK | June 2019 | May 2022 | Allow | 35 | 2 | 0 | Yes | No |
| 16440858 | INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING THE SAME, AND PROGRAM THEREFOR | June 2019 | July 2023 | Abandon | 49 | 4 | 0 | No | No |
| 16400207 | SOFT-WIRED RADIO (SWR) WEB MACHINE | May 2019 | March 2021 | Allow | 23 | 1 | 0 | Yes | No |
| 16366655 | Private Blockchain With Decentralized External Gateway | March 2019 | May 2023 | Abandon | 49 | 2 | 0 | No | No |
| 16286774 | SYSTEMS AND METHODS FOR CATEGORIZING SECURITY INCIDENTS | February 2019 | March 2020 | Allow | 13 | 1 | 0 | No | No |
| 16326945 | SECURE CONFIGURATION OF A DEVICE | February 2019 | August 2023 | Allow | 54 | 5 | 0 | Yes | No |
| 16326782 | SECURING AN ITEM OF DEVICE USE INFORMATION OF A DEVICE | February 2019 | January 2023 | Allow | 47 | 4 | 0 | No | No |
| 16255073 | FRAMEWORK FOR CYBER-PHYSICAL SYSTEM PROTECTION OF ELECTRIC VEHICLE CHARGING STATIONS AND POWER GRID | January 2019 | June 2022 | Allow | 41 | 3 | 0 | Yes | No |
| 16316406 | A SYSTEM AND METHOD FOR PROVIDING A SECURE DATA MONITORING SYSTEM IMPLEMENTED WITHIN FACTORY OR PLANT | January 2019 | October 2021 | Abandon | 34 | 1 | 0 | No | No |
| 16238216 | DECENTRALIZED PRIVACY-PRESERVING CLINICAL DATA EVALUATION | January 2019 | January 2022 | Allow | 37 | 2 | 0 | Yes | No |
| 16224678 | DETECTING SCRIPT-BASED MALWARE | December 2018 | November 2023 | Abandon | 59 | 6 | 0 | Yes | No |
| 16221647 | Profiling network entities and behavior | December 2018 | May 2023 | Allow | 53 | 8 | 0 | Yes | No |
| 16221753 | AUTHENTICATION FOR CONNECTING A BARCODE READER TO A CLIENT COMPUTING DEVICE | December 2018 | October 2020 | Allow | 22 | 1 | 0 | No | No |
| 16222501 | PLATFORM AND METHOD FOR RETROACTIVE RECLASSIFICATION EMPLOYING A CYBERSECURITY-BASED GLOBAL DATA STORE | December 2018 | October 2021 | Allow | 34 | 2 | 0 | Yes | No |
| 16222105 | AUTONOMOUS CONFIGURATION MODELING AND MANAGEMENT | December 2018 | September 2022 | Allow | 44 | 5 | 0 | Yes | No |
| 16222194 | Platform and Method for Enhanced Cyber-Attack Detection and Response Employing a Global Data Store | December 2018 | April 2022 | Abandon | 40 | 3 | 0 | Yes | No |
| 16222021 | SYSTEMS AND METHODS FOR INCREASING SECURITY IN SYSTEMS USING MESH NETWORKS | December 2018 | August 2021 | Abandon | 32 | 2 | 0 | No | No |
| 16179573 | INTELLIGENT SYSTEM FOR DETECTING MULTISTAGE ATTACKS | November 2018 | August 2021 | Allow | 33 | 2 | 0 | Yes | No |
| 16179403 | CLOUD-BASED MULTI-FUNCTION FIREWALL AND ZERO TRUST PRIVATE VIRTUAL NETWORK | November 2018 | May 2021 | Allow | 31 | 2 | 0 | No | No |
| 16178946 | AHEAD OF TIME APPLICATION LAUNCHING FOR CYBERSECURITY THREAT INTELLIGENCE OF NETWORK SECURITY EVENTS | November 2018 | April 2021 | Allow | 29 | 2 | 0 | Yes | No |
| 16091690 | REGISTRATION DESTINATION DETERMINATION DEVICE, SEARCHABLE ENCRYPTION SYSTEM, REGISTRATION DESTINATION DETERMINATION METHOD, AND COMPUTER READABLE MEDIUM | October 2018 | December 2020 | Allow | 26 | 1 | 0 | Yes | No |
| 16091452 | COMMUNICATION SYSTEM AND IN-VEHICLE COMMUNICATION APPARATUS | October 2018 | June 2021 | Abandon | 32 | 2 | 0 | Yes | No |
| 16074379 | SYSTEM AND METHOD FOR CORRELATING DIVERSE LOCATION DATA FOR DATA SECURITY | July 2018 | April 2021 | Allow | 32 | 2 | 0 | Yes | No |
| 16011243 | ADAPTABLE ACCESS TO DIGITAL ASSETS | June 2018 | November 2021 | Allow | 41 | 4 | 0 | Yes | No |
| 16011369 | SOFTWARE APPLICATION ACTIVATION USING A PICTURE-BASED ACTIVATION KEY | June 2018 | August 2020 | Allow | 26 | 2 | 0 | Yes | No |
| 16011461 | IDENTITY-BASED AUTHENTICATION AND ACCESS CONTROL MECHANISM | June 2018 | August 2022 | Allow | 50 | 5 | 0 | Yes | No |
| 15994951 | SYSTEMS AND METHODS FOR SPLIT NETWORK TUNNELING BASED ON TRAFFIC INSPECTION | May 2018 | February 2021 | Abandon | 32 | 2 | 0 | Yes | No |
| 15994928 | MEMORY ASSIGNMENT FOR GUEST OPERATING SYSTEMS | May 2018 | June 2020 | Allow | 24 | 1 | 0 | Yes | No |
| 15994946 | SYSTEMS AND METHODS OF BLOCKCHAIN PLATFORM FOR DISTRIBUTED APPLICATIONS | May 2018 | June 2021 | Allow | 36 | 3 | 0 | Yes | No |
| 15965715 | SYSTEM IN WHICH REDIRECT URL IS SET FOR EACH ACCESS RANGE OF RESOURCE, METHOD FOR THE SYSTEM, AND STORAGE MEDIUM FOR THE METHOD | April 2018 | March 2020 | Allow | 23 | 1 | 0 | No | No |
| 15965764 | LOCATION PRIVACY MANAGEMENT ON MAP-BASED SOCIAL MEDIA PLATFORMS | April 2018 | March 2022 | Allow | 46 | 4 | 0 | Yes | No |
| 15965787 | Predictive Modeling of Domain Names Using Web-Linking Characteristics | April 2018 | May 2020 | Allow | 25 | 0 | 0 | Yes | No |
| 15753507 | TRUSTWORTHY CLOUD-BASED SMART SPACE RATING WITH DISTRIBUTED DATA COLLECTION | February 2018 | February 2022 | Allow | 48 | 5 | 0 | Yes | No |
| 15751832 | FILE TRANSMITTING AND RECEIVING SYSTEM | February 2018 | April 2020 | Abandon | 27 | 1 | 0 | No | No |
| 15749338 | EXPENDABLE ACCESS CONTROL | January 2018 | December 2020 | Allow | 34 | 2 | 0 | No | No |
| 15877491 | COMMUNICATION SYSTEM, VEHICLE, AND MONITORING METHOD | January 2018 | March 2021 | Abandon | 37 | 2 | 0 | Yes | No |
| 15877514 | SYSTEMS, DEVICES, AND METHODS FOR IN-FIELD AUTHENTICATING OF AUTONOMOUS ROBOTS | January 2018 | May 2021 | Allow | 40 | 3 | 0 | No | No |
| 15877222 | ELECTRONIC APPARATUS, AND NON-TRANSITORY COMPUTER READABLE RECORDING MEDIUM STORING LOCK MANAGING PROGRAM | January 2018 | December 2020 | Abandon | 35 | 2 | 0 | No | No |
| 15851881 | Adaptive Data Sanitation System for Endpoints | December 2017 | December 2020 | Allow | 35 | 3 | 0 | Yes | No |
| 15851634 | Electronic Devices for Wave Pattern Data Transfer | December 2017 | March 2020 | Allow | 26 | 1 | 0 | Yes | No |
| 15572236 | Secure Container Platform for Resource Access and Placement on Unmanaged and Unsecured Devices | November 2017 | December 2020 | Allow | 37 | 2 | 0 | No | No |
| 15572082 | METHOD, SYSTEM, AND DEVICE FOR INFERRING MALICIOUS CODE RULE BASED ON DEEP LEARNING METHOD | November 2017 | October 2019 | Allow | 23 | 1 | 0 | Yes | No |
| 15569465 | SYSTEMS AND METHODS FOR DETECTING ATTACKS IN BIG DATA SYSTEMS | October 2017 | May 2020 | Allow | 31 | 2 | 0 | Yes | No |
| 15569481 | METHOD, FIRST DEVICE, SECOND DEVICE AND SERVER FOR PROVING USER INFORMATION WITH AUTHENTICATION DATA ISSUED BY THE SERVER AND VERIFIED ON-LINE | October 2017 | January 2021 | Allow | 39 | 3 | 0 | No | No |
| 15569653 | METHOD AND APPARATUS FOR ENABLING SHARING OF AN ASSET | October 2017 | July 2021 | Abandon | 45 | 4 | 0 | No | No |
| 15561668 | WEBPAGE UPDATING METHOD AND SYSTEM AND WEBPAGE SERVER | September 2017 | March 2021 | Allow | 41 | 4 | 0 | No | No |
| 15561564 | SECURITY INDICATOR SCORES | September 2017 | January 2022 | Allow | 52 | 2 | 0 | No | Yes |
| 15561556 | METHOD FOR PROTECTING SECURITY-RELEVANT DATA IN A CACHE MEMORY | September 2017 | January 2021 | Allow | 39 | 4 | 0 | No | No |
| 15705698 | METHOD AND SYSTEM FOR DATA DESTRUCTION IN A PHASE CHANGE MEMORY-BASED STORAGE DEVICE | September 2017 | August 2019 | Allow | 23 | 1 | 0 | Yes | No |
| 15706180 | METHODS AND APPARATUS TO PROVIDE USER-LEVEL ACCESS AUTHORIZATION FOR CLOUD-BASED FIELD-PROGRAMMABLE GATE ARRAYS | September 2017 | September 2019 | Allow | 24 | 1 | 0 | Yes | No |
| 15705605 | CALL PATH DEPENDENT AUTHENTICATION | September 2017 | April 2020 | Allow | 31 | 2 | 0 | Yes | No |
| 15705586 | IMAGE PROCESSING METHOD, IMAGE PROCESSING SYSTEM, RECORDING MEDIUM STORING PROGRAM | September 2017 | November 2019 | Abandon | 26 | 1 | 0 | Yes | No |
| 15684180 | SYSTEM AND METHOD FOR AGGREGATING CLIENT DATA AND CYBER DATA FOR AUTHENTICATION DETERMINATIONS | August 2017 | January 2021 | Allow | 41 | 4 | 0 | No | No |
| 15684107 | APPARATUS AND SYSTEM FOR INFORMATION PROCESSING | August 2017 | August 2020 | Allow | 36 | 3 | 0 | Yes | No |
| 15677337 | FUTURE CONSTRAINTS FOR HIERARCHICAL CHAIN OF TRUST | August 2017 | November 2019 | Allow | 27 | 1 | 0 | No | No |
| 15661880 | METHOD AND APPARATUS FOR SEAMLESS REMOTE RENEWAL OF OFFLINE GENERATED DIGITAL IDENTITY CERTIFICATES TO FIELD DEPLOYED HARDWARE SECURITY MODULES | July 2017 | January 2024 | Abandon | 60 | 5 | 0 | No | Yes |
| 15542011 | SYSTEM AND METHOD FOR NEUTRAL APPLICATION PROGRAMMING INTERFACE | July 2017 | March 2023 | Allow | 60 | 6 | 1 | Yes | No |
| 15471941 | DATA ACCESS INTERFACE FOR CLUSTERED DEVICES | March 2017 | February 2022 | Allow | 58 | 5 | 0 | Yes | No |
| 15471883 | DETECTION OF COMPUTER SECURITY THREATS BY MACHINE LEARNING | March 2017 | April 2019 | Allow | 24 | 0 | 0 | Yes | No |
| 15458331 | Active Inventory Discovery for Network Security | March 2017 | May 2022 | Abandon | 60 | 8 | 0 | Yes | No |
| 15458062 | SECURE RESOURCE ACCESS BASED ON PSYCHOMETRICS | March 2017 | July 2019 | Allow | 29 | 2 | 0 | Yes | No |
| 15458361 | Authentication in a Computer System | March 2017 | July 2019 | Abandon | 28 | 1 | 0 | Yes | No |
| 15440063 | Mic Verification Method in D2D Communications and D2D Communications System | February 2017 | November 2019 | Allow | 32 | 2 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner CHANG, LIN.
With a 0.0% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is in the bottom 25% across the USPTO, indicating that appeals face significant challenges here.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 40.0% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner CHANG, LIN works in Art Unit 2438 and has examined 120 patent applications in our dataset. With an allowance rate of 75.8%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 34 months.
Examiner CHANG, LIN's allowance rate of 75.8% places them in the 43% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by CHANG, LIN receive 2.38 office actions before reaching final disposition. This places the examiner in the 64% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by CHANG, LIN is 34 months. This places the examiner in the 43% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +13.7% benefit to allowance rate for applications examined by CHANG, LIN. This interview benefit is in the 51% percentile among all examiners. Recommendation: Interviews provide an above-average benefit with this examiner and are worth considering.
When applicants file an RCE with this examiner, 27.1% of applications are subsequently allowed. This success rate is in the 49% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.
This examiner enters after-final amendments leading to allowance in 10.2% of cases where such amendments are filed. This entry rate is in the 11% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 66.7% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 55% percentile among all examiners. Strategic Recommendation: Pre-appeal conferences show above-average effectiveness with this examiner. If you have strong arguments, a PAC request may result in favorable reconsideration.
This examiner withdraws rejections or reopens prosecution in 60.0% of appeals filed. This is in the 36% percentile among all examiners. Of these withdrawals, 66.7% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 20.0% are granted (fully or in part). This grant rate is in the 10% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 15% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 18% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.