Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 18745677 | RESOLVING THE DISPARATE IMPACT OF SECURITY EXPLOITS TO RESOURCES WITHIN A RESOURCE GROUP | June 2024 | March 2025 | Allow | 9 | 0 | 0 | No | No |
| 18740575 | AUTOMATED DATA MASKING WITH FALSE POSITIVE DETECTION AND AVOIDANCE | June 2024 | February 2025 | Allow | 8 | 0 | 0 | No | No |
| 18422108 | MULTIFACTOR AUTHORIZATION ON ACCESSING HARDWARE RESOURCES | January 2024 | April 2025 | Allow | 15 | 1 | 0 | Yes | No |
| 18416883 | SYSTEMS AND METHODS FOR ACCELERATING A DISPOSITION OF DIGITAL DISPUTE EVENTS IN A MACHINE LEARNING-BASED DIGITAL THREAT MITIGATION PLATFORM | January 2024 | August 2024 | Allow | 7 | 1 | 0 | Yes | No |
| 18517120 | METHOD OF VERIFICATION | November 2023 | May 2025 | Abandon | 18 | 1 | 0 | No | No |
| 18553346 | CIPHER SYSTEM, ENCRYPTION APPARATUS, DECRYPTION APPARATUS, METHOD, AND PROGRAM | September 2023 | May 2025 | Allow | 20 | 0 | 0 | Yes | No |
| 18465947 | AUTOMATED RESPONSIVE MESSAGE TO DETERMINE A SECURITY RISK OF A MESSAGE SENDER | September 2023 | November 2024 | Abandon | 15 | 1 | 0 | No | No |
| 18459603 | SECURING IN-VEHICLE SERVICE ORIENTED ARCHITECTURE WITH MAC GENERATE ALLOW LIST ENFORCEMENT IN HOST DEVICE | September 2023 | June 2025 | Allow | 21 | 0 | 0 | No | No |
| 18365384 | CORRELATED RISK IN CYBERSECURITY | August 2023 | November 2024 | Allow | 16 | 1 | 0 | No | No |
| 18229930 | ENHANCED CRYPTOGRAPHIC HASH DIGESTS USING QUANTUM COMPUTING | August 2023 | May 2025 | Allow | 21 | 0 | 0 | Yes | No |
| 18216992 | SYSTEMS AND METHODS FOR PROVIDING AUTHENTICATION TO A PLURALITY OF DEVICES | June 2023 | February 2024 | Allow | 7 | 0 | 0 | Yes | No |
| 18312101 | System and Method for Bitcoin Mining with Reduced Power | May 2023 | June 2024 | Allow | 13 | 0 | 0 | No | No |
| 18034849 | INFORMATION CONCEALING CONTROL APPARATUS, INFORMATION CONCEALING APPARATUS, INFORMATION RECONFIGURATION CONTROL APPARATUS, INFORMATION RECONFIGURING APPARATUS, INFORMATION CONCEALING SYSTEM, INFORMATION CONCEALING CONTROL METHOD, INFORMATION RECONFIGURATION CONTROL METHOD, INFORMATION CONCEALING CONTROL PROGRAM, AND INFORMATION RECONFIGURATION CONTROL PROGRAM | May 2023 | April 2025 | Allow | 23 | 1 | 0 | No | No |
| 18114072 | SYSTEM AND METHOD FOR DYNAMIC INTEGRATION OF USER-PROVIDED DATA WITH ONE-TIME-PASSWORD AUTHENTICATION CRYPTOGRAM | February 2023 | May 2025 | Allow | 26 | 1 | 0 | Yes | No |
| 18104156 | METHOD AND APPARATUS FOR ON-THE-FLY OUT OF BAND TEMPORARY KEY DERIVATION AND ASSIGNMENT FOR PAIRING | January 2023 | June 2025 | Allow | 28 | 0 | 1 | Yes | No |
| 18149082 | Mutually Distrusting Enclaves | December 2022 | September 2023 | Allow | 9 | 1 | 0 | Yes | No |
| 18089746 | INFORMATION INTEGRITY IN BLOCKCHAIN AND RELATED TECHNOLOGIES | December 2022 | November 2023 | Abandon | 11 | 1 | 0 | No | No |
| 18145454 | TIME-BASED ENCRYPTION KEY DERIVATION | December 2022 | March 2025 | Allow | 27 | 4 | 0 | Yes | No |
| 18079898 | METHOD FOR FORMING VIRTUAL PRIVATE NETWORK PROVIDING VIRTUAL PRIVATE NETWORK THROUGH SEALED KEY EXCHANGE BASED ON POST QUANTUM CRYPTOGRAPHY AND SYSTEM FOR OPERATING VIRTUAL PRIVATE NETWORK PERFORMING SAME | December 2022 | August 2024 | Allow | 20 | 0 | 0 | No | No |
| 18061855 | ESTABLISHING A SECURE COMMUNICATION LINK | December 2022 | May 2024 | Allow | 17 | 2 | 0 | Yes | No |
| 18059219 | ENCRYPTION SYSTEM FOR MEDICAL DEVICES | November 2022 | January 2024 | Allow | 13 | 1 | 0 | No | No |
| 17989390 | Authentication Method | November 2022 | October 2024 | Allow | 23 | 3 | 1 | Yes | No |
| 17987483 | SCALABLE SECURITY ANALYSIS OF BEHAVIORAL EVENTS | November 2022 | June 2025 | Abandon | 31 | 1 | 0 | No | No |
| 17981830 | SYSTEMS AND METHODS FOR ACCELERATING A DISPOSITION OF DIGITAL DISPUTE EVENTS IN A MACHINE LEARNING-BASED DIGITAL THREAT MITIGATION PLATFORM | November 2022 | November 2023 | Allow | 12 | 1 | 1 | Yes | No |
| 17978413 | CONTROL DEVICE AND CONTROL METHOD | November 2022 | February 2025 | Abandon | 28 | 1 | 0 | No | No |
| 17973890 | SOURCE DATA SECURED ON BLOCKCHAINS | October 2022 | July 2024 | Allow | 21 | 3 | 0 | Yes | No |
| 17973137 | SYSTEM AND METHOD FOR SIEM RULE SORTING AND CONDITIONAL EXECUTION | October 2022 | July 2024 | Allow | 20 | 1 | 0 | Yes | No |
| 18048463 | NFT Minting Method And Apparatus With Digital Certificate-Based Role Authentication And NFT Role Verifying Method And Apparatus | October 2022 | December 2024 | Abandon | 26 | 0 | 1 | No | No |
| 17970000 | IN-VEHICLE CONTROL APPARATUS | October 2022 | May 2025 | Allow | 31 | 1 | 0 | Yes | No |
| 17953175 | APPLICATIONS AS RESOURCE PRINCIPALS OR SERVICE PRINCIPALS | September 2022 | February 2025 | Allow | 29 | 1 | 0 | Yes | No |
| 17952864 | SYSTEM AND METHOD FOR USING USER CONTEXT AND BEHAVIOR FOR PROVIDING ACCESS TO A SECURE COMPUTER NETWORK | September 2022 | June 2024 | Allow | 21 | 1 | 1 | Yes | No |
| 17820066 | MOBILE TERMINAL, CONTROL METHOD, AND STORAGE MEDIUM | August 2022 | April 2025 | Allow | 32 | 2 | 0 | Yes | No |
| 17815976 | SYSTEMS AND METHODS FOR REAL-TIME CYBER INCIDENT DETECTION IN DATA SPARSE ENVIRONMENTS USING ARTIFICIAL INTELLIGENCE | July 2022 | February 2025 | Allow | 31 | 1 | 1 | Yes | No |
| 17869298 | Trusted Execution Environment | July 2022 | May 2025 | Allow | 34 | 2 | 0 | Yes | No |
| 17813070 | Authenticating a virtual entity in a virtual environment | July 2022 | August 2024 | Allow | 25 | 0 | 0 | Yes | No |
| 17857389 | Method, Device, and System for Application Key Generation and Management in a Communication Network for Encrypted Communication with Service Applications | July 2022 | February 2025 | Allow | 31 | 2 | 1 | No | No |
| 17851609 | CLIENT PRIVACY PRESERVING SESSION RESUMPTION | June 2022 | June 2023 | Allow | 12 | 1 | 0 | Yes | No |
| 17735448 | THREAT MITIGATION SYSTEM AND METHOD | May 2022 | June 2024 | Allow | 26 | 2 | 0 | Yes | No |
| 17728990 | METHOD OF VERIFICATION | April 2022 | February 2024 | Abandon | 22 | 1 | 0 | No | No |
| 17717616 | Positive Enforcement Domain Name Service Firewall | April 2022 | January 2025 | Abandon | 33 | 1 | 0 | No | No |
| 17702366 | SYSTEMS AND PROCESSES FOR LOSSY BIOMETRIC REPRESENTATIONS | March 2022 | April 2023 | Allow | 13 | 0 | 0 | Yes | No |
| 17702355 | SYSTEMS AND PROCESSES FOR LOSSY BIOMETRIC REPRESENTATIONS | March 2022 | September 2023 | Allow | 18 | 1 | 0 | Yes | No |
| 17702361 | SYSTEMS AND PROCESSES FOR LOSSY BIOMETRIC REPRESENTATIONS | March 2022 | August 2023 | Allow | 17 | 1 | 0 | Yes | No |
| 17668367 | ADAPTIVE AUTHORIZATION WITH LOCAL ROUTE IDENTIFIER | February 2022 | June 2024 | Allow | 28 | 1 | 0 | Yes | No |
| 17583561 | AUTHENTICATION METHOD AND TERMINAL DEVICE | January 2022 | April 2024 | Allow | 27 | 2 | 0 | Yes | No |
| 17582369 | SYSTEMS AND METHODS FOR AUTOMATED MALICIOUS CODE REPLACEMENT | January 2022 | February 2025 | Allow | 37 | 2 | 0 | Yes | No |
| 17576115 | RUNTIME RISK ASSESSMENT TO PROTECT STORAGE SYSTEMS FROM DATA LOSS | January 2022 | November 2024 | Allow | 34 | 0 | 1 | Yes | No |
| 17575709 | IMAGE FORMING APPARATUS CAPABLE OF EXECUTING APPLICATION PROGRAMS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM | January 2022 | August 2024 | Allow | 31 | 1 | 0 | No | No |
| 17575597 | AUTHENTICATION SYSTEM, AUTHENTICATION SERVER, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM | January 2022 | August 2024 | Allow | 31 | 2 | 0 | Yes | No |
| 17570218 | Indirect Service-To-Service Role Mapping Systems and Methods | January 2022 | September 2024 | Abandon | 33 | 1 | 0 | No | No |
| 17528730 | METHOD AND SYSTEM FOR SECURE IoT DEVICE ONBOARDING USING A BLOCKCHAIN NETWORK | November 2021 | October 2023 | Allow | 23 | 0 | 0 | Yes | No |
| 17520445 | IDENTIFYING APPLICATION PROGRAM INTERFACE USE IN A BINARY CODE | November 2021 | July 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17518636 | EDGE-COMPUTING-BASED ARCHITECTURES FOR MULTI-LAYERED FRAUD MITIGATION | November 2021 | April 2023 | Allow | 18 | 0 | 0 | Yes | No |
| 17602166 | CIRCUITS AND METHODS FOR PERFORMING HASH ALGORITHM | October 2021 | January 2023 | Allow | 15 | 2 | 0 | No | No |
| 17493577 | GENERATING AND ANALYZING NETWORK PROFILE DATA | October 2021 | May 2024 | Allow | 32 | 2 | 0 | Yes | Yes |
| 17448498 | PHYSICAL UPLINK CHANNEL HANDLING BASED ON CHANNEL SECURITY | September 2021 | November 2024 | Allow | 37 | 2 | 0 | Yes | No |
| 17593044 | PHASE CODER-DECODER FOR QUANTUM KEY DISTRIBUTION, AND CORRESPONDING CODEC APPARATUS AND SYSTEM | September 2021 | May 2024 | Allow | 32 | 1 | 0 | No | No |
| 17462614 | SECURING CORPORATE ASSETS IN THE HOME | August 2021 | April 2024 | Allow | 31 | 1 | 0 | Yes | No |
| 17398999 | SYSTEMS AND METHODS FOR MANAGING IDS IN IAM/RESOURCE POLICIES | August 2021 | May 2024 | Allow | 34 | 1 | 0 | No | No |
| 17393504 | INTELLIGENT REQUEST ROUTING WITHIN SERVICE MESH | August 2021 | February 2024 | Allow | 31 | 1 | 0 | No | No |
| 17389247 | ABNORMALITY DETECTION IN LOG ENTRY COLLECTION | July 2021 | February 2024 | Allow | 31 | 2 | 0 | Yes | No |
| 17374608 | METHOD AND SYSTEM FOR IMPLEMENTING AN INTENT-BASED INTRUSION DETECTION AND PREVENTION SYSTEM USING CONTEXTUAL ATTRIBUTES | July 2021 | December 2024 | Abandon | 41 | 2 | 0 | No | No |
| 17310015 | VARIABLE DATA PROTECTION | July 2021 | November 2023 | Allow | 28 | 1 | 0 | Yes | No |
| 17367000 | SYSTEM AND METHOD FOR CORRELATING DIVERSE LOCATION DATA FOR DATA SECURITY | July 2021 | January 2024 | Allow | 31 | 2 | 0 | Yes | No |
| 17366869 | SIGNATURE VERIFICATION FOR A BLOCKCHAIN LEDGER | July 2021 | November 2021 | Allow | 4 | 0 | 0 | Yes | No |
| 17356356 | MESSAGING SERVER CREDENTIALS EXFILTRATION BASED MALWARE THREAT ASSESSMENT AND MITIGATION | June 2021 | December 2023 | Allow | 30 | 1 | 1 | Yes | No |
| 17353490 | NETWORK NODE AUTHENTICATION | June 2021 | March 2024 | Abandon | 33 | 2 | 0 | No | No |
| 17347018 | MULTIFACTOR AUTHORIZATION ON ACCESSING HARDWARE RESOURCES | June 2021 | November 2023 | Allow | 29 | 2 | 0 | Yes | No |
| 17335957 | ENTITLEMENT MANAGEMENT MESSAGE EPOCH AS AN EXTERNAL TRUSTED TIME SOURCE | June 2021 | January 2023 | Allow | 19 | 0 | 0 | Yes | No |
| 17313728 | METHODS AND SYSTEMS OF SECURELY TRANSFERRING DATA | May 2021 | January 2023 | Allow | 21 | 0 | 0 | Yes | No |
| 17243834 | FAST SECURE BOOTING METHOD AND SYSTEM | April 2021 | December 2023 | Allow | 31 | 2 | 0 | Yes | No |
| 17240461 | ONLINE MARKETPLACE OF PLUGINS FOR ENHANCING DIALOG SYSTEMS | April 2021 | August 2023 | Allow | 28 | 2 | 0 | Yes | No |
| 17239143 | ANOMALY DETECTION IN COMPUTING SYSTEM EVENTS | April 2021 | August 2023 | Allow | 27 | 2 | 0 | Yes | No |
| 17234456 | SYSTEMS AND METHODS FOR PROVIDING AUTHENTICATION TO A PLURALITY OF DEVICES | April 2021 | March 2023 | Allow | 23 | 0 | 0 | Yes | No |
| 17227707 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM | April 2021 | November 2023 | Abandon | 31 | 2 | 0 | No | No |
| 17221109 | Unified Software Library Access and Vulnerability Correction Prioritization | April 2021 | July 2023 | Allow | 27 | 2 | 0 | Yes | No |
| 17278979 | DATA STORAGE MEANS CONTROL APPARATUS AND METHOD HAVING DATA PROTECTION FUNCTION BY USING WIRELESS COMMUNICATION WITH SMARTPHONE | March 2021 | March 2024 | Abandon | 36 | 1 | 1 | No | No |
| 17192444 | MANAGING GROUPED STUDENT DEVICES WITH TIMED LOCKS | March 2021 | March 2025 | Allow | 48 | 4 | 0 | Yes | No |
| 17270259 | Systems and Methods for Preventing Side-Channel Attacks | February 2021 | August 2023 | Allow | 30 | 1 | 0 | No | No |
| 17180687 | ESTABLISHING ACCESS TO A SECURE NETWORK BASED ON USER-CREATED CREDENTIAL INDICIA | February 2021 | January 2024 | Allow | 35 | 2 | 0 | Yes | No |
| 17179630 | CORRELATED RISK IN CYBERSECURITY | February 2021 | May 2023 | Allow | 26 | 2 | 0 | Yes | No |
| 17168455 | Authentication Method | February 2021 | August 2022 | Allow | 18 | 0 | 1 | Yes | No |
| 17155293 | SYSTEM AND METHODS FOR TAMPER PROOF INTERACTION RECORDING AND TIMESTAMPING | January 2021 | December 2022 | Allow | 23 | 1 | 0 | No | No |
| 17152019 | APPARATUS AND METHOD FOR DETECTING AN ANOMALY IN A DATASET AND COMPUTER PROGRAM PRODUCT THEREFOR | January 2021 | March 2024 | Abandon | 38 | 1 | 0 | No | No |
| 17152621 | Service-to-Service Role Mapping Systems and Methods | January 2021 | August 2023 | Allow | 31 | 1 | 0 | Yes | No |
| 17149520 | AUTOMATED DATA MASKING WITH FALSE POSITIVE DETECTION AND AVOIDANCE | January 2021 | April 2024 | Allow | 39 | 1 | 1 | Yes | No |
| 17140017 | SYSTEM AND METHOD TO IDENTIFY USER AND DEVICE BEHAVIOR ABNORMALITIES TO CONTINUOUSLY MEASURE TRANSACTION RISK | January 2021 | April 2022 | Allow | 16 | 2 | 1 | Yes | No |
| 17134364 | ISA ACCESSIBLE PHYSICAL UNCLONABLE FUNCTION | December 2020 | February 2023 | Allow | 26 | 1 | 0 | Yes | No |
| 17134360 | ISA ACCESSIBLE PHYSICAL UNCLONABLE FUNCTION | December 2020 | February 2023 | Allow | 26 | 1 | 0 | Yes | No |
| 17134365 | ISA ACCESSIBLE PHYSICAL UNCLONABLE FUNCTION | December 2020 | September 2022 | Allow | 21 | 0 | 0 | Yes | No |
| 17123944 | METHOD AND SYSTEM FOR ON DEMAND CONTROL OF HARDWARE SUPPORT FOR SOFTWARE POINTER AUTHENTIFICATION IN A COMPUTING SYSTEM | December 2020 | February 2024 | Allow | 38 | 1 | 0 | Yes | No |
| 17247480 | SYSTEM PLATFORM INITIALIZER FOR MIXED-CRITICAL SYSTEMS | December 2020 | January 2023 | Allow | 26 | 1 | 0 | Yes | No |
| 16973544 | SYSTEM AND METHOD FOR DETECTING MALICIOUS ACTIVITIES AND ANOMALIES IN BUILDING SYSTEMS | December 2020 | January 2024 | Allow | 37 | 1 | 0 | No | No |
| 17111969 | SECURE MEDIUM INTRUSION PREVENTION | December 2020 | March 2025 | Allow | 51 | 3 | 0 | Yes | No |
| 17110238 | TRIPLICATION REGISTER COMPRISING A SECURITY DEVICE | December 2020 | December 2022 | Abandon | 24 | 1 | 0 | No | No |
| 17091937 | SYSTEM AND APPARATUS FOR BIOMETRIC IDENTIFICATION OF A UNIQUE USER AND AUTHORIZATION OF THE UNIQUE USER | November 2020 | July 2024 | Allow | 44 | 3 | 1 | Yes | No |
| 17074055 | DESIGN LOCKOUT SYSTEMS AND METHODS | October 2020 | October 2024 | Allow | 47 | 4 | 0 | Yes | No |
| 17046039 | Mutually Distrusting Enclaves | October 2020 | September 2022 | Allow | 23 | 1 | 0 | Yes | No |
| 17035960 | ONLINE AUTHENTICATION AND SECURITY MANAGEMENT USING DEVICE-BASED IDENTIFICATION | September 2020 | December 2022 | Allow | 27 | 1 | 0 | Yes | No |
| 17036386 | MEMORY CONTROLLER, STORAGE DEVICE INCLUDING THE SAME, AND OPERATING METHOD OF THE MEMORY CONTROLLER | September 2020 | February 2023 | Allow | 28 | 1 | 0 | Yes | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner LYNCH, SHARON S.
With a 22.2% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 35.3% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is above the USPTO average, suggesting that filing an appeal can be an effective strategy for prompting reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
✓ Filing a Notice of Appeal is strategically valuable. The act of filing often prompts favorable reconsideration during the mandatory appeal conference.
Examiner LYNCH, SHARON S works in Art Unit 2438 and has examined 464 patent applications in our dataset. With an allowance rate of 78.4%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 28 months.
Examiner LYNCH, SHARON S's allowance rate of 78.4% places them in the 39% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by LYNCH, SHARON S receive 1.69 office actions before reaching final disposition. This places the examiner in the 48% percentile for office actions issued. This examiner issues fewer office actions than average, which may indicate efficient prosecution or a more lenient examination style.
The median time to disposition (half-life) for applications examined by LYNCH, SHARON S is 28 months. This places the examiner in the 51% percentile for prosecution speed. Prosecution timelines are slightly faster than average with this examiner.
Conducting an examiner interview provides a +52.7% benefit to allowance rate for applications examined by LYNCH, SHARON S. This interview benefit is in the 95% percentile among all examiners. Recommendation: Interviews are highly effective with this examiner and should be strongly considered as a prosecution strategy. Per MPEP § 713.10, interviews are available at any time before the Notice of Allowance is mailed or jurisdiction transfers to the PTAB.
When applicants file an RCE with this examiner, 36.1% of applications are subsequently allowed. This success rate is in the 77% percentile among all examiners. Strategic Insight: RCEs are highly effective with this examiner compared to others. If you receive a final rejection, filing an RCE with substantive amendments or arguments has a strong likelihood of success.
This examiner enters after-final amendments leading to allowance in 5.2% of cases where such amendments are filed. This entry rate is in the 2% percentile among all examiners. Strategic Recommendation: This examiner rarely enters after-final amendments compared to other examiners. You should generally plan to file an RCE or appeal rather than relying on after-final amendment entry. Per MPEP § 714.12, primary examiners have discretion in entering after-final amendments, and this examiner exercises that discretion conservatively.
When applicants request a pre-appeal conference (PAC) with this examiner, 28.6% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 28% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 55.0% of appeals filed. This is in the 21% percentile among all examiners. Of these withdrawals, 36.4% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner rarely withdraws rejections during the appeal process compared to other examiners. If you file an appeal, be prepared to fully prosecute it to a PTAB decision. Per MPEP § 1207, the examiner will prepare an Examiner's Answer maintaining the rejections.
When applicants file petitions regarding this examiner's actions, 27.8% are granted (fully or in part). This grant rate is in the 19% percentile among all examiners. Strategic Note: Petitions are rarely granted regarding this examiner's actions compared to other examiners. Ensure you have a strong procedural basis before filing a petition, as the Technology Center Director typically upholds this examiner's decisions.
Examiner's Amendments: This examiner makes examiner's amendments in 0.0% of allowed cases (in the 13% percentile). This examiner rarely makes examiner's amendments compared to other examiners. You should expect to make all necessary claim amendments yourself through formal amendment practice.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 1.1% of allowed cases (in the 57% percentile). This examiner issues Quayle actions more often than average when claims are allowable but formal matters remain (MPEP § 714.14).
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.