Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18636335 | System and Method for Quantum-Enabled Cyber Security in a Wireless Mobile Network | April 2024 | March 2026 | Allow | 23 | 1 | 0 | No | No |
| 18695628 | PROVENANCE GRAPH-ORIENTED HOST INTRUSION DETECTION METHOD AND SYSTEM, AND STORAGE MEDIUM | March 2024 | September 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18610127 | DATA MANAGEMENT METHOD AND APPARATUS FOR BLOCKCHAIN SYSTEM, MEDIUM, AND ELECTRONIC DEVICE | March 2024 | August 2025 | Allow | 17 | 1 | 0 | Yes | No |
| 18584531 | INTENT-BASED ENTERPRISE SECURITY USING DYNAMIC LEARNING OF NETWORK SEGMENT PREFIXES | February 2024 | May 2025 | Allow | 15 | 1 | 0 | No | No |
| 18397161 | FILTERING DATA LOGS FROM DISPARATE DATA SOURCES | December 2023 | February 2025 | Allow | 14 | 1 | 0 | No | No |
| 18532953 | Method and System for Remote Data Access | December 2023 | January 2026 | Abandon | 26 | 1 | 0 | No | No |
| 18503551 | METHODS PROVIDING NON-3GPP ACCESS USING ACCESS NETWORK KEYS AND RELATED WIRELESS TERMINALS AND NETWORK NODES | November 2023 | September 2025 | Abandon | 22 | 1 | 0 | No | No |
| 18386741 | TRUST EXTENSION IN A SECURE COMMUNICATION FRAMEWORK | November 2023 | July 2025 | Allow | 20 | 2 | 0 | Yes | No |
| 18495745 | CRYPTOSYSTEM MIGRATION FOR SECURE BOOT SEQUENCES | October 2023 | March 2026 | Allow | 28 | 1 | 0 | Yes | No |
| 18373134 | THREAT DETECTION PLATFORMS FOR DETECTING, CHARACTERIZING, AND REMEDIATING EMAIL-BASED THREATS IN REAL TIME | September 2023 | October 2025 | Allow | 25 | 3 | 0 | Yes | No |
| 18461747 | Systems and methods for providing multi-tab browser isolation | September 2023 | October 2025 | Allow | 26 | 1 | 0 | No | No |
| 18227352 | METHOD AND ELECTRONIC DEVICE FOR DETERMINING SECURITY THREAT ON RADIO ACCESS NETWORK | July 2023 | February 2026 | Allow | 31 | 5 | 0 | Yes | No |
| 18274632 | QKD SWITCHING SYSTEM AND PROTOCOLS | July 2023 | February 2026 | Allow | 30 | 2 | 0 | No | No |
| 18262833 | ROAMING IN CELLULAR COMMUNICATION NETWORKS | July 2023 | July 2025 | Allow | 24 | 1 | 0 | Yes | No |
| 18347158 | SECURITY SYSTEM FOR MANAGING 5G NETWORK TRAFFIC BACKGROUND | July 2023 | October 2024 | Allow | 16 | 1 | 0 | Yes | No |
| 18209714 | DERIVING AND AUGMENTING ACCESS CONTROL FOR DATA LAKES | June 2023 | October 2024 | Allow | 16 | 2 | 0 | Yes | No |
| 18325517 | Visual access code to a service | May 2023 | February 2026 | Abandon | 33 | 2 | 0 | No | No |
| 18033440 | METHOD FOR SECURING THE OPERATION OF AN INDUSTRIAL SYSTEM AND ASSOCIATED DEVICES | April 2023 | March 2026 | Abandon | 35 | 2 | 0 | No | No |
| 18131199 | PROVIDING ISOLATION IN VIRTUALIZED SYSTEMS USING TRUST DOMAINS | April 2023 | January 2026 | Abandon | 33 | 2 | 0 | No | No |
| 18026279 | SATELLITE COMMUNICATIONS NETWORK INTRUSION DETECTION SYSTEMS AND METHODS | March 2023 | August 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 18098737 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND METHOD OF PROCESSING INFORMATION | January 2023 | April 2025 | Allow | 26 | 3 | 0 | Yes | No |
| 18065679 | SERVER APPARATUS AND CONTROL METHOD THEREOF, INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF, INFORMATION PROCESSING SYSTEM, AND STORAGE MEDIUM | December 2022 | April 2025 | Allow | 28 | 1 | 0 | No | No |
| 18061522 | Method and System for Remote Data Access | December 2022 | September 2023 | Allow | 9 | 1 | 0 | No | No |
| 18073577 | DATA SECURITY VERIFICATION METHOD AND ELECTRONIC APPARATUS | December 2022 | October 2025 | Allow | 35 | 3 | 0 | No | No |
| 18059629 | DATE OFFSET IN DOCUMENT | November 2022 | August 2025 | Allow | 32 | 2 | 0 | No | No |
| 17992194 | METHOD AND SYSTEM FOR AUTHENTICATING A USER ON AN IDENTITY-AS-A-SERVICE SERVER WITH A TRUSTED THIRD PARTY | November 2022 | February 2026 | Allow | 39 | 3 | 0 | Yes | No |
| 18056885 | SYSTEMS AND METHODS FOR DIGITAL RETIREMENT OF INFORMATION HANDLING SYSTEMS | November 2022 | November 2025 | Allow | 36 | 3 | 0 | Yes | No |
| 17977175 | SYSTEMS AND METHODS FOR AN ENTITY TO CONTROL INFORMATION EXCHANGE | October 2022 | October 2023 | Allow | 12 | 2 | 0 | Yes | No |
| 17976144 | SYSTEMS AND METHODS FOR USE IN IMPLEMENTING SELF-EXCLUSION PREFERENCES | October 2022 | February 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 17975291 | ACCESS CONTROL LIST (ACL) AND ROLE-BASED ACCESS CONTROL (RBAC) MANAGEMENT USING CONTENT-BASED DATASETS | October 2022 | March 2026 | Allow | 40 | 3 | 0 | No | No |
| 17973072 | METHOD AND SYSTEM FOR OUT-OF-BAND USER IDENTIFICATION IN THE METAVERSE VIA BIOGRAPHICAL (BIO) ID | October 2022 | December 2025 | Allow | 37 | 2 | 1 | Yes | No |
| 17918890 | NUMERICAL VALUE RANKING METHOD AND APPARATUS BASED ON BLOCKCHAIN | October 2022 | September 2023 | Allow | 11 | 1 | 0 | Yes | No |
| 17949320 | System And Method Of Detecting File System Modifications Via Multi-layer File System State | September 2022 | July 2023 | Allow | 10 | 2 | 0 | Yes | No |
| 17949910 | Privacy Enhanced BSS and Discovery Mechanisms | September 2022 | February 2025 | Allow | 29 | 1 | 0 | No | No |
| 17945750 | Offset Data Integrity Checks for Latency Reduction | September 2022 | March 2026 | Allow | 42 | 3 | 0 | Yes | No |
| 17879805 | SECURE TIME SOURCE FOR TRUSTED EXECUTION ENVIRONMENTS | August 2022 | November 2024 | Abandon | 27 | 2 | 0 | No | No |
| 17844571 | SYSTEM AND METHOD OF INTELLIGENT DETECTION OF DATA MODEL FIELDNAME LINEAGE WITH GEOGRAPHICAL LOCATION MOVEMENT CONTROL | June 2022 | April 2025 | Allow | 34 | 4 | 0 | Yes | No |
| 17836587 | Method and System for Remote Data Access | June 2022 | September 2022 | Allow | 3 | 1 | 0 | No | No |
| 17830853 | URL PATTERN-BASED RISK SCORING AND ANOMALY DETECTION | June 2022 | November 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17824323 | CONTROL ASSESSMENT SYSTEMS, METHODS AND PROGRAM PRODUCTS | May 2022 | October 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17777843 | SECURE OPERATING MODES FOR COMPUTING DEVICES | May 2022 | December 2023 | Allow | 19 | 2 | 0 | Yes | No |
| 17741521 | METHOD TO RANDOMIZE ONLINE ACTIVITY | May 2022 | September 2025 | Allow | 41 | 3 | 0 | Yes | No |
| 17662477 | PENETRATION TESTING FOR API SERVICE SECURITY | May 2022 | August 2025 | Allow | 39 | 3 | 0 | Yes | No |
| 17729563 | SYSTEMS AND METHODS FOR MANAGING PARTIAL PRIVATE KEYS FOR CRYPTOGRAPHY-BASED, STORAGE APPLICATIONS USED IN BLOCKCHAIN OPERATIONS FOR DECENTRALIZED APPLICATIONS | April 2022 | January 2025 | Allow | 33 | 1 | 0 | Yes | No |
| 17729955 | BLOCKCHAIN MACHINE COMPUTE ACCELERATION ENGINE WITH OUT-OF-ORDER SUPPORT | April 2022 | September 2025 | Allow | 41 | 3 | 0 | Yes | No |
| 17722561 | SECURE AND ROBUST FEDERATED LEARNING SYSTEM AND METHOD BY MULTI-PARTY HOMOMORPHIC ENCRYPTION | April 2022 | May 2025 | Allow | 37 | 2 | 0 | Yes | No |
| 17722298 | SECURE DATA ACCESS FOR ELECTRONIC DEVICES | April 2022 | October 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17712704 | DIRECTORY SERVICE USER SYNCHRONIZATION | April 2022 | July 2023 | Allow | 15 | 1 | 0 | Yes | No |
| 17709787 | APPARATUS AND METHOD FOR FIRST VALUE DEVICE VERIFICATION | March 2022 | July 2025 | Allow | 40 | 3 | 0 | Yes | No |
| 17697098 | SECURING DATA VIA ENCRYPTED GEO-LOCATED PROVENANCE METADATA | March 2022 | February 2024 | Allow | 23 | 1 | 0 | No | No |
| 17687445 | UNMANNED AERIAL VEHICLE AUTHENTICATION METHOD AND APPARATUS | March 2022 | June 2023 | Allow | 15 | 1 | 0 | No | No |
| 17573192 | PRIVACY ENFORCEMENT VIA LOCALIZED PERSONALIZATION | January 2022 | February 2024 | Abandon | 25 | 2 | 0 | No | No |
| 17622610 | DATA ENCRYPTION AND DECRYPTION METHOD, DEVICE, STORAGE MEDIUM AND ENCRYPTED FILE | December 2021 | March 2025 | Allow | 39 | 2 | 0 | Yes | No |
| 17645622 | SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY OPTIMIZATION | December 2021 | April 2023 | Allow | 16 | 1 | 0 | No | No |
| 17546768 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR PROTECTING A DEEP REINFORCEMENT LEARNING AGENT | December 2021 | March 2024 | Allow | 27 | 1 | 1 | No | No |
| 17457467 | TRACKING A POTENTIAL ATTACKER ON AN EXTERNAL COMPUTER SYSTEM | December 2021 | September 2025 | Allow | 45 | 5 | 0 | Yes | No |
| 17596020 | METHOD FOR TRANSMITTING INFORMATION | December 2021 | March 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17596071 | IMAGE RECOGNITION SYSTEM, IMAGE RECOGNITION SERVER, AND IMAGE RECOGNITION | December 2021 | August 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17526777 | SCALABLE AND SECURE EDGE CLUSTER REGISTRATION | November 2021 | August 2024 | Allow | 33 | 2 | 0 | Yes | No |
| 17526713 | METHOD AND APPARATUS FOR CONTROLLING ELEVATOR | November 2021 | August 2025 | Abandon | 45 | 2 | 1 | No | No |
| 17609140 | GATEWAY DEVICE | November 2021 | July 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17516309 | METHOD FOR AUTHENTICATING USER AND ELECTRONIC DEVICE ASSISTING SAME | November 2021 | February 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17505435 | CELLULAR INTERNET OF THINGS BATTERY DRAIN PREVENTION IN MOBILE NETWORKS | October 2021 | June 2023 | Allow | 20 | 1 | 0 | Yes | No |
| 17450753 | MULTI-USER COLLABORATION TOOL FOR SPREADSHEET APPLICATIONS | October 2021 | February 2024 | Abandon | 28 | 1 | 0 | No | No |
| 17500816 | SYSTEMS AND METHODS FOR USING IDENTIFIERS OF ENROLLMENT SYSTEMS FOR USER AUTHENTICATION | October 2021 | December 2024 | Allow | 38 | 3 | 0 | Yes | No |
| 17498273 | THREAT DETECTION PLATFORMS FOR DETECTING, CHARACTERIZING, AND REMEDIATING EMAIL-BASED THREATS IN REAL TIME | October 2021 | September 2022 | Allow | 11 | 2 | 0 | Yes | No |
| 17601696 | DATA SHARING | October 2021 | July 2024 | Abandon | 34 | 1 | 0 | No | No |
| 17484689 | Re-Training Intrusion Detection Fingerprints in the Presence of an Attacker | September 2021 | August 2024 | Allow | 35 | 1 | 0 | Yes | No |
| 17483329 | FPGA CHIP WITH PROTECTED JTAG INTERFACE | September 2021 | November 2023 | Allow | 26 | 1 | 0 | No | No |
| 17474035 | OBFUSCATING INTELLIGENT DATA WHILE PRESERVING RESERVE VALUES | September 2021 | January 2024 | Allow | 29 | 2 | 0 | Yes | No |
| 17470451 | PRIVACY, PERMISSION, AND USER SAFETY MANAGEMENT VIRTUAL ASSISTANT FOR A COMMUNICATION SESSION | September 2021 | September 2024 | Allow | 36 | 1 | 1 | No | No |
| 17464267 | COMPUTER SECURITY SYSTEM AND METHOD | September 2021 | December 2023 | Abandon | 28 | 1 | 0 | No | No |
| 17432956 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR CONTROLLING ACCESS IN A NETWORK OF SERVERS | August 2021 | May 2024 | Allow | 33 | 1 | 0 | Yes | No |
| 17394930 | MTC KEY MANAGEMENT FOR KEY DERIVATION AT BOTH UE AND NETWORK | August 2021 | February 2026 | Abandon | 55 | 6 | 0 | Yes | No |
| 17392871 | BLOCKCHAIN-BASED DATA EVIDENCE STORAGE METHOD AND APPARATUS | August 2021 | September 2022 | Allow | 14 | 2 | 0 | Yes | No |
| 17377845 | PREEMPTIVE PROTECTION AGAINST MALICIOUS ARRAY ACCESS | July 2021 | October 2023 | Allow | 27 | 1 | 0 | No | No |
| 17364131 | CLASSIFYING DATA AND ENFORCING DATA ACCESS CONTROL USING A CONTEXT-BASED HIERARCHICAL POLICY | June 2021 | May 2025 | Allow | 46 | 5 | 0 | No | No |
| 17417571 | THREAT FORECASTING | June 2021 | May 2024 | Abandon | 35 | 1 | 0 | No | No |
| 17347025 | USER CREDENTIALS VERIFICATION FOR SEARCH | June 2021 | July 2023 | Allow | 25 | 2 | 0 | Yes | No |
| 17331355 | SYSTEMS AND METHODS FOR MITIGATING BORDER GATEWAY PROTOCOL ATTACKS IN REAL-TIME | May 2021 | April 2024 | Allow | 34 | 1 | 0 | No | No |
| 17315412 | SYSTEM AND METHOD FOR SCRUBBING DNS IN A TELECOMMUNICATIONS NETWORK TO MITIGATE ATTACKS | May 2021 | July 2025 | Allow | 50 | 2 | 0 | Yes | Yes |
| 17243836 | Private application access with browser isolation | April 2021 | March 2024 | Allow | 34 | 2 | 0 | Yes | No |
| 17241383 | ACCESS CONTROL FOR ON-DEVICE MACHINE LEARNING MODELS | April 2021 | October 2024 | Allow | 41 | 3 | 0 | Yes | No |
| 17237872 | ANOMALY-BASED MITIGATION OF ACCESS REQUEST RISK | April 2021 | April 2025 | Allow | 47 | 4 | 0 | Yes | No |
| 17286633 | INFORMATION PROCESSING SYSTEM, INPUT DEVICE, USER AUTHENTICATION METHOD, SERVER DEVICE, AND BIOMETRIC AUTHENTICATION DEVICE | April 2021 | January 2025 | Allow | 44 | 3 | 0 | Yes | No |
| 17222830 | SECURE ASSET MANAGEMENT SYSTEM | April 2021 | April 2023 | Allow | 24 | 1 | 0 | No | No |
| 17301278 | INTENT-BASED ENTERPRISE SECURITY USING DYNAMIC LEARNING OF NETWORK SEGMENT PREFIXES | March 2021 | October 2023 | Allow | 30 | 1 | 0 | No | No |
| 17217119 | ADAPTIVE METADATA ENCRYPTION FOR A DATA PROTECTION SOFTWARE | March 2021 | November 2024 | Allow | 43 | 5 | 0 | No | No |
| 17214252 | SYSTEMS AND METHODS TO CONTROL ACCESS TO COMPONENTS OF VIRTUAL OBJECTS | March 2021 | March 2023 | Allow | 24 | 1 | 0 | No | No |
| 17207278 | CONSENSUS VERIFICATION METHOD, APPARATUS, AND DEVICE | March 2021 | September 2021 | Allow | 6 | 1 | 0 | No | No |
| 17187377 | Treating Data Flows Differently Based on Level of Interest | February 2021 | January 2024 | Allow | 35 | 1 | 0 | Yes | No |
| 17180821 | Providing Single Sign-On (SSO) in disjoint networks with non-overlapping authentication protocols | February 2021 | June 2024 | Allow | 39 | 3 | 0 | No | No |
| 17178320 | METHOD AND SYSTEM FOR GENERATING A LIST OF INDICATORS OF COMPROMISE | February 2021 | October 2023 | Allow | 32 | 1 | 0 | No | No |
| 17176945 | RISK-BASED ACCESS TO COMPUTING ENVIRONMENT SECRETS | February 2021 | June 2023 | Allow | 28 | 1 | 2 | Yes | No |
| 17268436 | ENCRYPTION FOR BLOCKCHAIN CRYPTOCURRENCY TRANSACTIONS AND USES IN CONJUNCTION WITH CARBON CREDITS | February 2021 | May 2024 | Abandon | 39 | 0 | 1 | No | No |
| 17173584 | VIRTUAL SERVICE AUTHORIZATION | February 2021 | June 2025 | Allow | 52 | 8 | 0 | Yes | No |
| 17170595 | BLINDING TECHNIQUES FOR POST-QUANTUM PUBLIC KEYS | February 2021 | November 2023 | Abandon | 33 | 2 | 0 | Yes | No |
| 17160597 | METHOD AND SYSTEM FOR LIMITING DATA ACCESSIBILITY IN COMPOSED SYSTEMS | January 2021 | November 2022 | Allow | 21 | 1 | 0 | No | No |
| 17148258 | DATA MANAGEMENT METHOD AND APPARATUS FOR BLOCKCHAIN SYSTEM, MEDIUM, AND ELECTRONIC DEVICE | January 2021 | January 2024 | Allow | 36 | 1 | 0 | Yes | No |
| 17140542 | SYSTEM AND METHOD FOR QUANTUM-ENABLED CYBER SECURITY IN A WIRELESS MOBILE NETWORK | January 2021 | January 2024 | Allow | 36 | 1 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner HERZOG, MADHURI R.
With a 21.1% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 29.7% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner HERZOG, MADHURI R works in Art Unit 2438 and has examined 620 patent applications in our dataset. With an allowance rate of 78.9%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 32 months.
Examiner HERZOG, MADHURI R's allowance rate of 78.9% places them in the 47% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by HERZOG, MADHURI R receive 2.25 office actions before reaching final disposition. This places the examiner in the 63% percentile for office actions issued. This examiner issues a slightly above-average number of office actions.
The median time to disposition (half-life) for applications examined by HERZOG, MADHURI R is 32 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +11.4% benefit to allowance rate for applications examined by HERZOG, MADHURI R. This interview benefit is in the 46% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 30.5% of applications are subsequently allowed. This success rate is in the 60% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 26.9% of cases where such amendments are filed. This entry rate is in the 38% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 34.8% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 34% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 57.8% of appeals filed. This is in the 31% percentile among all examiners. Of these withdrawals, 38.5% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 42.9% are granted (fully or in part). This grant rate is in the 35% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 3.5% of allowed cases (in the 81% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 18% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.