Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18695628 | PROVENANCE GRAPH-ORIENTED HOST INTRUSION DETECTION METHOD AND SYSTEM, AND STORAGE MEDIUM | March 2024 | September 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18584531 | INTENT-BASED ENTERPRISE SECURITY USING DYNAMIC LEARNING OF NETWORK SEGMENT PREFIXES | February 2024 | May 2025 | Allow | 15 | 1 | 0 | No | No |
| 18397161 | FILTERING DATA LOGS FROM DISPARATE DATA SOURCES | December 2023 | February 2025 | Allow | 14 | 1 | 0 | No | No |
| 18347158 | SECURITY SYSTEM FOR MANAGING 5G NETWORK TRAFFIC BACKGROUND | July 2023 | October 2024 | Allow | 16 | 1 | 0 | Yes | No |
| 18209714 | DERIVING AND AUGMENTING ACCESS CONTROL FOR DATA LAKES | June 2023 | October 2024 | Allow | 16 | 2 | 0 | Yes | No |
| 18098737 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND METHOD OF PROCESSING INFORMATION | January 2023 | April 2025 | Allow | 26 | 3 | 0 | Yes | No |
| 18065679 | SERVER APPARATUS AND CONTROL METHOD THEREOF, INFORMATION PROCESSING APPARATUS AND CONTROL METHOD THEREOF, INFORMATION PROCESSING SYSTEM, AND STORAGE MEDIUM | December 2022 | April 2025 | Allow | 28 | 1 | 0 | No | No |
| 18061522 | Method and System for Remote Data Access | December 2022 | September 2023 | Allow | 9 | 1 | 0 | No | No |
| 17977175 | SYSTEMS AND METHODS FOR AN ENTITY TO CONTROL INFORMATION EXCHANGE | October 2022 | October 2023 | Allow | 12 | 2 | 0 | Yes | No |
| 17976144 | SYSTEMS AND METHODS FOR USE IN IMPLEMENTING SELF-EXCLUSION PREFERENCES | October 2022 | February 2025 | Allow | 28 | 1 | 0 | Yes | No |
| 17918890 | NUMERICAL VALUE RANKING METHOD AND APPARATUS BASED ON BLOCKCHAIN | October 2022 | September 2023 | Allow | 11 | 1 | 0 | Yes | No |
| 17949910 | Privacy Enhanced BSS and Discovery Mechanisms | September 2022 | February 2025 | Allow | 29 | 1 | 0 | No | No |
| 17949320 | System And Method Of Detecting File System Modifications Via Multi-layer File System State | September 2022 | July 2023 | Allow | 10 | 2 | 0 | Yes | No |
| 17879805 | SECURE TIME SOURCE FOR TRUSTED EXECUTION ENVIRONMENTS | August 2022 | November 2024 | Abandon | 27 | 2 | 0 | No | No |
| 17844571 | SYSTEM AND METHOD OF INTELLIGENT DETECTION OF DATA MODEL FIELDNAME LINEAGE WITH GEOGRAPHICAL LOCATION MOVEMENT CONTROL | June 2022 | April 2025 | Allow | 34 | 4 | 0 | Yes | No |
| 17836587 | Method and System for Remote Data Access | June 2022 | September 2022 | Allow | 3 | 1 | 0 | No | No |
| 17830853 | URL PATTERN-BASED RISK SCORING AND ANOMALY DETECTION | June 2022 | November 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17824323 | CONTROL ASSESSMENT SYSTEMS, METHODS AND PROGRAM PRODUCTS | May 2022 | October 2024 | Allow | 29 | 1 | 0 | Yes | No |
| 17777843 | SECURE OPERATING MODES FOR COMPUTING DEVICES | May 2022 | December 2023 | Allow | 19 | 2 | 0 | Yes | No |
| 17729563 | SYSTEMS AND METHODS FOR MANAGING PARTIAL PRIVATE KEYS FOR CRYPTOGRAPHY-BASED, STORAGE APPLICATIONS USED IN BLOCKCHAIN OPERATIONS FOR DECENTRALIZED APPLICATIONS | April 2022 | January 2025 | Allow | 33 | 1 | 0 | Yes | No |
| 17722561 | SECURE AND ROBUST FEDERATED LEARNING SYSTEM AND METHOD BY MULTI-PARTY HOMOMORPHIC ENCRYPTION | April 2022 | May 2025 | Allow | 37 | 2 | 0 | Yes | No |
| 17722298 | SECURE DATA ACCESS FOR ELECTRONIC DEVICES | April 2022 | October 2024 | Allow | 30 | 1 | 0 | Yes | No |
| 17712704 | DIRECTORY SERVICE USER SYNCHRONIZATION | April 2022 | July 2023 | Allow | 15 | 1 | 0 | Yes | No |
| 17697098 | SECURING DATA VIA ENCRYPTED GEO-LOCATED PROVENANCE METADATA | March 2022 | February 2024 | Allow | 23 | 1 | 0 | No | No |
| 17687445 | UNMANNED AERIAL VEHICLE AUTHENTICATION METHOD AND APPARATUS | March 2022 | June 2023 | Allow | 15 | 1 | 0 | No | No |
| 17573192 | PRIVACY ENFORCEMENT VIA LOCALIZED PERSONALIZATION | January 2022 | February 2024 | Abandon | 25 | 2 | 0 | No | No |
| 17622610 | DATA ENCRYPTION AND DECRYPTION METHOD, DEVICE, STORAGE MEDIUM AND ENCRYPTED FILE | December 2021 | March 2025 | Allow | 39 | 2 | 0 | Yes | No |
| 17645622 | SYSTEMS AND METHODS FOR POST-QUANTUM CRYPTOGRAPHY OPTIMIZATION | December 2021 | April 2023 | Allow | 16 | 1 | 0 | No | No |
| 17546768 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR PROTECTING A DEEP REINFORCEMENT LEARNING AGENT | December 2021 | March 2024 | Allow | 27 | 1 | 1 | No | No |
| 17596020 | METHOD FOR TRANSMITTING INFORMATION | December 2021 | March 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17596071 | IMAGE RECOGNITION SYSTEM, IMAGE RECOGNITION SERVER, AND IMAGE RECOGNITION | December 2021 | August 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17526777 | SCALABLE AND SECURE EDGE CLUSTER REGISTRATION | November 2021 | August 2024 | Allow | 33 | 2 | 0 | Yes | No |
| 17609140 | GATEWAY DEVICE | November 2021 | July 2024 | Allow | 32 | 2 | 0 | Yes | No |
| 17516309 | METHOD FOR AUTHENTICATING USER AND ELECTRONIC DEVICE ASSISTING SAME | November 2021 | February 2024 | Allow | 27 | 1 | 0 | Yes | No |
| 17505435 | CELLULAR INTERNET OF THINGS BATTERY DRAIN PREVENTION IN MOBILE NETWORKS | October 2021 | June 2023 | Allow | 20 | 1 | 0 | Yes | No |
| 17500816 | SYSTEMS AND METHODS FOR USING IDENTIFIERS OF ENROLLMENT SYSTEMS FOR USER AUTHENTICATION | October 2021 | December 2024 | Allow | 38 | 3 | 0 | Yes | No |
| 17450753 | MULTI-USER COLLABORATION TOOL FOR SPREADSHEET APPLICATIONS | October 2021 | February 2024 | Abandon | 28 | 1 | 0 | No | No |
| 17498273 | THREAT DETECTION PLATFORMS FOR DETECTING, CHARACTERIZING, AND REMEDIATING EMAIL-BASED THREATS IN REAL TIME | October 2021 | September 2022 | Allow | 11 | 2 | 0 | Yes | No |
| 17601696 | DATA SHARING | October 2021 | July 2024 | Abandon | 34 | 1 | 0 | No | No |
| 17484689 | Re-Training Intrusion Detection Fingerprints in the Presence of an Attacker | September 2021 | August 2024 | Allow | 35 | 1 | 0 | Yes | No |
| 17483329 | FPGA CHIP WITH PROTECTED JTAG INTERFACE | September 2021 | November 2023 | Allow | 26 | 1 | 0 | No | No |
| 17474035 | OBFUSCATING INTELLIGENT DATA WHILE PRESERVING RESERVE VALUES | September 2021 | January 2024 | Allow | 29 | 2 | 0 | Yes | No |
| 17470451 | PRIVACY, PERMISSION, AND USER SAFETY MANAGEMENT VIRTUAL ASSISTANT FOR A COMMUNICATION SESSION | September 2021 | September 2024 | Allow | 36 | 1 | 1 | No | No |
| 17464267 | COMPUTER SECURITY SYSTEM AND METHOD | September 2021 | December 2023 | Abandon | 28 | 1 | 0 | No | No |
| 17432956 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR CONTROLLING ACCESS IN A NETWORK OF SERVERS | August 2021 | May 2024 | Allow | 33 | 1 | 0 | Yes | No |
| 17392871 | BLOCKCHAIN-BASED DATA EVIDENCE STORAGE METHOD AND APPARATUS | August 2021 | September 2022 | Allow | 14 | 2 | 0 | Yes | No |
| 17377845 | PREEMPTIVE PROTECTION AGAINST MALICIOUS ARRAY ACCESS | July 2021 | October 2023 | Allow | 27 | 1 | 0 | No | No |
| 17364131 | CLASSIFYING DATA AND ENFORCING DATA ACCESS CONTROL USING A CONTEXT-BASED HIERARCHICAL POLICY | June 2021 | May 2025 | Allow | 46 | 5 | 0 | No | No |
| 17417571 | THREAT FORECASTING | June 2021 | May 2024 | Abandon | 35 | 1 | 0 | No | No |
| 17347025 | USER CREDENTIALS VERIFICATION FOR SEARCH | June 2021 | July 2023 | Allow | 25 | 2 | 0 | Yes | No |
| 17331355 | SYSTEMS AND METHODS FOR MITIGATING BORDER GATEWAY PROTOCOL ATTACKS IN REAL-TIME | May 2021 | April 2024 | Allow | 34 | 1 | 0 | No | No |
| 17243836 | Private application access with browser isolation | April 2021 | March 2024 | Allow | 34 | 2 | 0 | Yes | No |
| 17241383 | ACCESS CONTROL FOR ON-DEVICE MACHINE LEARNING MODELS | April 2021 | October 2024 | Allow | 41 | 3 | 0 | Yes | No |
| 17237872 | ANOMALY-BASED MITIGATION OF ACCESS REQUEST RISK | April 2021 | April 2025 | Allow | 47 | 4 | 0 | Yes | No |
| 17286633 | INFORMATION PROCESSING SYSTEM, INPUT DEVICE, USER AUTHENTICATION METHOD, SERVER DEVICE, AND BIOMETRIC AUTHENTICATION DEVICE | April 2021 | January 2025 | Allow | 44 | 3 | 0 | Yes | No |
| 17222830 | SECURE ASSET MANAGEMENT SYSTEM | April 2021 | April 2023 | Allow | 24 | 1 | 0 | No | No |
| 17301278 | INTENT-BASED ENTERPRISE SECURITY USING DYNAMIC LEARNING OF NETWORK SEGMENT PREFIXES | March 2021 | October 2023 | Allow | 30 | 1 | 0 | No | No |
| 17217119 | ADAPTIVE METADATA ENCRYPTION FOR A DATA PROTECTION SOFTWARE | March 2021 | November 2024 | Allow | 43 | 5 | 0 | No | No |
| 17214252 | SYSTEMS AND METHODS TO CONTROL ACCESS TO COMPONENTS OF VIRTUAL OBJECTS | March 2021 | March 2023 | Allow | 24 | 1 | 0 | No | No |
| 17207278 | CONSENSUS VERIFICATION METHOD, APPARATUS, AND DEVICE | March 2021 | September 2021 | Allow | 6 | 1 | 0 | No | No |
| 17187377 | Treating Data Flows Differently Based on Level of Interest | February 2021 | January 2024 | Allow | 35 | 1 | 0 | Yes | No |
| 17180821 | Providing Single Sign-On (SSO) in disjoint networks with non-overlapping authentication protocols | February 2021 | June 2024 | Allow | 39 | 3 | 0 | No | No |
| 17178320 | METHOD AND SYSTEM FOR GENERATING A LIST OF INDICATORS OF COMPROMISE | February 2021 | October 2023 | Allow | 32 | 1 | 0 | No | No |
| 17176945 | RISK-BASED ACCESS TO COMPUTING ENVIRONMENT SECRETS | February 2021 | June 2023 | Allow | 28 | 1 | 2 | Yes | No |
| 17268436 | ENCRYPTION FOR BLOCKCHAIN CRYPTOCURRENCY TRANSACTIONS AND USES IN CONJUNCTION WITH CARBON CREDITS | February 2021 | May 2024 | Abandon | 39 | 0 | 1 | No | No |
| 17173584 | VIRTUAL SERVICE AUTHORIZATION | February 2021 | June 2025 | Allow | 52 | 8 | 0 | Yes | No |
| 17170595 | BLINDING TECHNIQUES FOR POST-QUANTUM PUBLIC KEYS | February 2021 | November 2023 | Abandon | 33 | 2 | 0 | Yes | No |
| 17160597 | METHOD AND SYSTEM FOR LIMITING DATA ACCESSIBILITY IN COMPOSED SYSTEMS | January 2021 | November 2022 | Allow | 21 | 1 | 0 | No | No |
| 17148258 | DATA MANAGEMENT METHOD AND APPARATUS FOR BLOCKCHAIN SYSTEM, MEDIUM, AND ELECTRONIC DEVICE | January 2021 | January 2024 | Allow | 36 | 1 | 0 | Yes | No |
| 17140542 | SYSTEM AND METHOD FOR QUANTUM-ENABLED CYBER SECURITY IN A WIRELESS MOBILE NETWORK | January 2021 | January 2024 | Allow | 36 | 1 | 0 | No | No |
| 17133177 | AUTOMATING IOT DEVICE IDENTIFICATION USING STATISTICAL PAYLOAD FINGERPRINTS | December 2020 | February 2024 | Allow | 38 | 4 | 0 | Yes | No |
| 17122506 | Peer-to-peer geolocation system | December 2020 | December 2022 | Abandon | 24 | 1 | 0 | No | No |
| 17119500 | DECENTRALIZED ENCRYPTION AND DECRYPTION OF BLOCKCHAIN DATA | December 2020 | February 2023 | Allow | 26 | 2 | 0 | Yes | No |
| 17098706 | SYSTEM AND METHOD FOR DETECTING MALICIOUS FILES BY A USER COMPUTER | November 2020 | July 2023 | Allow | 32 | 3 | 0 | Yes | No |
| 17054741 | ENCRYPTION SYSTEM, ENCRYPTION APPARATUS, DECRYPTION APPARATUS, ENCRYPTION METHOD, DECRYPTION METHOD, AND PROGRAM | November 2020 | June 2024 | Abandon | 43 | 4 | 0 | No | No |
| 17091275 | METHOD AND ELECTRONIC DEVICE FOR DETERMINING SECURITY THREAT ON RADIO ACCESS NETWORK | November 2020 | March 2023 | Allow | 28 | 2 | 0 | No | No |
| 17090588 | APPLICATION PROGRAM INTEGRITY VERIFICATION METHOD AND NETWORK DEVICE | November 2020 | July 2024 | Abandon | 44 | 4 | 0 | Yes | No |
| 17089514 | FILTERING DATA LOGS FROM DISPARATE DATA SOURCES FOR PROCESSING BY A SECURITY ENGINE | November 2020 | September 2023 | Allow | 34 | 2 | 0 | Yes | No |
| 17087786 | Storage of Data Objects in a Storage Network | November 2020 | June 2024 | Allow | 44 | 5 | 0 | No | No |
| 17070058 | SECURITY INCIDENT AND EVENT MANAGEMENT USE CASE SELECTION | October 2020 | August 2022 | Allow | 22 | 2 | 0 | Yes | No |
| 17039864 | QUORUM-BASED ACCESS CONTROL MANAGEMENT | September 2020 | October 2023 | Allow | 37 | 4 | 0 | Yes | No |
| 17032624 | SYSTEM AND METHOD FOR INTRUSION DETECTION ON A PHYSICAL LEVEL USING AN INTERNAL ANALOG TO DIGITAL CONVERTER | September 2020 | August 2024 | Allow | 46 | 2 | 0 | Yes | Yes |
| 16979838 | TRUST EXTENSION IN A SECURE COMMUNICATION FRAMEWORK | September 2020 | August 2023 | Allow | 35 | 3 | 0 | Yes | Yes |
| 16996039 | SECURITY SYSTEM, STORAGE MEDIUM STORING COMPUTER PROGRAM, AND DATA DIAGNOSTIC METHOD | August 2020 | September 2022 | Allow | 25 | 1 | 0 | Yes | No |
| 16996830 | Peer-to-peer geolocation system | August 2020 | March 2022 | Allow | 19 | 1 | 0 | Yes | No |
| 16921803 | SECURITY SYSTEM FOR DIRECTING 5G NETWORK TRAFFIC | July 2020 | November 2022 | Allow | 29 | 1 | 0 | Yes | No |
| 16921798 | DISTRIBUTED SECURITY SYSTEM FOR VULNERABILITY-RISK-THREAT (VRT) DETECTION | July 2020 | June 2023 | Allow | 35 | 3 | 0 | Yes | No |
| 16921765 | SECURITY SYSTEM FOR MANAGING 5G NETWORK TRAFFIC | July 2020 | March 2023 | Allow | 33 | 2 | 0 | Yes | No |
| 16956270 | INTERFACE FOR A HARDWARE SECURITY MODULE | June 2020 | April 2023 | Allow | 34 | 3 | 0 | Yes | No |
| 16895350 | SYSTEM AND METHOD FOR AUTOMATIC SECURE DELIVERY OF MODEL | June 2020 | August 2023 | Abandon | 38 | 2 | 1 | No | No |
| 16867566 | SYSTEMS AND METHODS FOR OPERATING SECURE ELLIPTIC CURVE CRYPTOSYSTEMS | May 2020 | July 2021 | Allow | 14 | 1 | 0 | Yes | No |
| 16854103 | BIOMETRIC VERIFICATION OF A BLOCKCHAIN DATABASE TRANSACTION CONTRIBUTOR | April 2020 | May 2021 | Allow | 13 | 1 | 0 | No | No |
| 16757672 | DATA-PROCESSING DEVICE, COMPLETE ENTITY, AND METHOD FOR OPERATING A DATA-PROCESSING DEVICE OR COMPLETE ENTITY | April 2020 | July 2022 | Allow | 27 | 1 | 0 | Yes | No |
| 16848503 | BLOCKCHAIN-BASED DATA EVIDENCE STORAGE METHOD AND APPARATUS | April 2020 | April 2021 | Allow | 12 | 2 | 0 | Yes | No |
| 16835871 | AUTOMATIC INTRUSION DETECTION METHOD AND APPARATUS | March 2020 | October 2023 | Allow | 43 | 3 | 1 | No | No |
| 16643836 | CRYPTOGRAPHIC MEMORY OWNERSHIP | March 2020 | March 2022 | Allow | 24 | 1 | 0 | Yes | No |
| 16638938 | DATA PROTECTION SYSTEM, DATA PROTECTION METHOD, AND RECORDING MEDIUM | February 2020 | July 2022 | Allow | 29 | 2 | 0 | No | No |
| 16786451 | INTRUDER DETECTION USING QUANTUM KEY DISTRIBUTION | February 2020 | April 2022 | Allow | 26 | 2 | 0 | Yes | No |
| 16631560 | METHODS PROVIDING NON-3GPP ACCESS USING ACCESS NETWORK KEYS AND RELATED WIRELESS TERMINALS AND NETWORK NODES | January 2020 | August 2023 | Allow | 43 | 4 | 1 | No | No |
| 16735817 | MOBILE DEVICE APPLICATION SOFTWARE SECURITY | January 2020 | June 2023 | Abandon | 41 | 4 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner HERZOG, MADHURI R.
With a 22.2% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 30.6% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner HERZOG, MADHURI R works in Art Unit 2438 and has examined 640 patent applications in our dataset. With an allowance rate of 79.5%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 31 months.
Examiner HERZOG, MADHURI R's allowance rate of 79.5% places them in the 41% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by HERZOG, MADHURI R receive 2.21 office actions before reaching final disposition. This places the examiner in the 75% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by HERZOG, MADHURI R is 31 months. This places the examiner in the 36% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +11.3% benefit to allowance rate for applications examined by HERZOG, MADHURI R. This interview benefit is in the 49% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 30.6% of applications are subsequently allowed. This success rate is in the 53% percentile among all examiners. Strategic Insight: RCEs show above-average effectiveness with this examiner. Consider whether your amendments or new arguments are strong enough to warrant an RCE versus filing a continuation.
This examiner enters after-final amendments leading to allowance in 28.3% of cases where such amendments are filed. This entry rate is in the 32% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 36.4% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 33% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 58.1% of appeals filed. This is in the 27% percentile among all examiners. Of these withdrawals, 40.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 41.1% are granted (fully or in part). This grant rate is in the 42% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 3.4% of allowed cases (in the 84% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 16% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.