Detailed information about the 100 most recent patent applications.
| Application Number | Title | Filing Date | Disposal Date | Disposition | Time (months) | Office Actions | Restrictions | Interview | Appeal |
|---|---|---|---|---|---|---|---|---|---|
| 19014323 | CONTEXTUAL ANOMALY DETECTION IN ACTIVITY LOGS | January 2025 | October 2025 | Allow | 9 | 2 | 0 | No | No |
| 18963738 | METHODS AND SYSTEMS FOR INDUSTRIAL INTERNET OF THINGS (IIOT) SECURITY MANAGEMENT BASED ON MANAGEMENT CLOUD PLATFORM | November 2024 | August 2025 | Allow | 8 | 1 | 0 | No | No |
| 18882395 | SYSTEM AND METHOD FOR ACHIEVING SYSTEM XSS PREVENTION IN COMPONENTIZED FORM | September 2024 | June 2025 | Allow | 9 | 2 | 0 | Yes | No |
| 18800976 | RANSOMWARE DETECTION AND DATA PRUNING MANAGEMENT | August 2024 | March 2026 | Allow | 19 | 1 | 0 | No | No |
| 18786811 | SYSTEM AND METHOD FOR ADAPTIVE DECEPTION ORCHESTRATION | July 2024 | March 2026 | Allow | 19 | 1 | 0 | No | No |
| 18774270 | CYBERSECURITY THREAT HUNTING | July 2024 | June 2025 | Abandon | 11 | 1 | 0 | No | No |
| 18761048 | ROGUE DEVICE DETECTION INCLUDING MAC ADDRESS SPOOFING DETECTION | July 2024 | January 2026 | Allow | 18 | 2 | 0 | No | Yes |
| 18755019 | Gamification of Security Program And Engineer Work Product | June 2024 | November 2025 | Abandon | 17 | 3 | 0 | Yes | No |
| 18639422 | COLLABORATIVE COMMUNICATIONS ENVIRONMENT AND PRIVACY SETTING ASSOCIATED THEREWITH | April 2024 | May 2025 | Allow | 13 | 2 | 0 | Yes | No |
| 18637260 | METHODS, APPARATUSES, COMPUTER PROGRAMS AND CARRIERS FOR SECURITY MANAGEMENT BEFORE HANDOVER FROM 5G TO 4G SYSTEM | April 2024 | November 2025 | Allow | 19 | 2 | 0 | No | No |
| 18624274 | Method for Automating Security Architecture Reviews and Assessments | April 2024 | June 2025 | Abandon | 15 | 1 | 0 | No | No |
| 18694493 | DISCLOSED-MATERIAL-CONCEALING DEVICE, DISCLOSED-MATERIAL-CONCEALING METHOD, AND RECORDING MEDIUM STORING DISCLOSED-MATERIAL-CONCEALING PROGRAM | March 2024 | January 2026 | Abandon | 22 | 1 | 0 | No | No |
| 18440800 | MALICIOUS HOMOGLYPHIC DOMAIN NAME DETECTION AND ASSOCIATED CYBER SECURITY APPLICATIONS | February 2024 | August 2024 | Allow | 6 | 1 | 0 | Yes | No |
| 18420638 | DETECTION OF UNKNOWN APPLICATIONS | January 2024 | November 2024 | Allow | 10 | 2 | 0 | Yes | No |
| 18396581 | Elastic Service Instance Provisioning in a Dynamic Service Chain | December 2023 | May 2025 | Allow | 16 | 1 | 0 | No | No |
| 18395471 | DYNAMICALLY TAILORED TRUST FOR SECURE APPLICATION-SERVICE NETWORKING IN AN ENTERPRISE | December 2023 | July 2025 | Abandon | 19 | 1 | 0 | No | No |
| 18572915 | COMPUTER-IMPLEMENTED METHOD FOR COMPUTING UNBALANCED L-TREES EFFICIENTLY FOR HASH-BASED SIGNATURES USED IN POST-QUANTUM CRYPTOGRAPHIC AUTHENTICATION | December 2023 | December 2024 | Allow | 12 | 1 | 0 | No | No |
| 18543659 | Automated Security Analysis of Software Libraries | December 2023 | January 2026 | Allow | 25 | 1 | 0 | No | No |
| 18542786 | SYSTEM AND METHOD FOR MONITORING AND MANAGING COMPUTING ENVIRONMENT | December 2023 | October 2025 | Allow | 22 | 4 | 0 | No | No |
| 18511629 | SYSTEM AND METHOD FOR PROVIDING SECURITY POSTURE MANAGEMENT FOR AI APPLICATIONS | November 2023 | January 2026 | Allow | 26 | 4 | 0 | No | No |
| 18385384 | DEVICE FOR AUTOMATICALLY SORTING CYBER ATTACK BASED ON ARTIFICIAL INTELLIGENCE USING SECURITY EVENT OF DIFFERENT KINDS OF SECURITY DEVICES | October 2023 | February 2026 | Abandon | 27 | 1 | 0 | No | No |
| 18375372 | METHODS AND APPARATUS FOR SELECTIVE ENCRYPTION OF EXECUTE IN PLACE (XIP) DATA | September 2023 | August 2025 | Allow | 23 | 1 | 0 | No | No |
| 18476488 | SECURITY INFORMATION CAPTURE AND DISTRIBUTION | September 2023 | March 2026 | Allow | 30 | 3 | 0 | Yes | No |
| 18473438 | ON-DEMAND SOFTWARE-DEFINED SECURITY SERVICE ORCHESTRATION FOR A 5G WIRELESS NETWORK | September 2023 | September 2025 | Allow | 24 | 2 | 0 | Yes | No |
| 18224902 | DETECTING POLYMORPHIC BOTNETS USING AN IMAGE RECOGNITION PLATFORM | July 2023 | January 2026 | Allow | 30 | 2 | 0 | Yes | No |
| 18222901 | MALICIOUS HOMOGLYPHIC DOMAIN NAME DETECTION AND ASSOCIATED CYBER SECURITY APPLICATIONS | July 2023 | November 2023 | Allow | 4 | 0 | 0 | No | No |
| 18334244 | SYSTEMS AND METHODS TO PROVIDE INFORMATION SECURITY BY CONDUCTING A PHISHING VULNERABILITY ASSESSMENT | June 2023 | May 2024 | Allow | 11 | 2 | 0 | Yes | No |
| 18128789 | INLINE RANSOMWARE DETECTION VIA SERVER MESSAGE BLOCK (SMB) TRAFFIC | March 2023 | March 2025 | Allow | 23 | 5 | 0 | Yes | No |
| 18027855 | DETECTION OF ALTERED DOCUMENTS | March 2023 | December 2024 | Allow | 21 | 2 | 0 | Yes | No |
| 18187969 | SYSTEM AND METHOD FOR DEVICE AUTHENTICATION IN A DISTRIBUTED ENVIRONMENT WITHOUT USER INTERVENTION | March 2023 | March 2025 | Allow | 24 | 0 | 0 | No | No |
| 18122953 | Offensive Cybersecurity Appliance | March 2023 | January 2025 | Allow | 22 | 3 | 0 | Yes | No |
| 18108523 | METHODS, APPARATUSES, COMPUTER PROGRAMS AND CARRIERS FOR SECURITY MANAGEMENT BEFORE HANDOVER FROM 5G TO 4G SYSTEM | February 2023 | December 2023 | Allow | 10 | 0 | 0 | No | No |
| 18107006 | COORDINATING MAINTENANCE MANAGEMENT OPERATIONS VIA A SECURE DEPLOYMENT SYSTEM | February 2023 | January 2024 | Allow | 12 | 1 | 0 | Yes | No |
| 18152343 | CONTROLLING ACCESS TO CLOUD RESOURCES IN DATA USING CLOUD-ENABLED DATA TAGGING AND A DYNAMIC ACCESS CONTROL POLICY ENGINE | January 2023 | September 2024 | Abandon | 20 | 2 | 0 | Yes | No |
| 18058324 | REGION-BASED AUTHENTICATION AND ACCESS POLICIES FOR SERVICES | November 2022 | June 2025 | Abandon | 31 | 2 | 0 | Yes | No |
| 17960204 | System and Method for Machine Learning Driven Automated Incident Prevention for Distributed Systems | October 2022 | December 2025 | Allow | 38 | 3 | 0 | Yes | No |
| 17958562 | REMOTE MONITORING OF A SECURITY OPERATIONS CENTER (SOC) | October 2022 | February 2026 | Allow | 40 | 8 | 0 | Yes | Yes |
| 17954314 | SYSTEM FOR PRIVATELY SHARING VERIFIED VIDEO | September 2022 | February 2025 | Allow | 29 | 2 | 0 | No | No |
| 17953028 | MULTIFACTOR AUTHENTICATION VIA BIFURCATED PASSCODE AND NON-FUNGIBLE TOKEN | September 2022 | May 2025 | Allow | 32 | 0 | 0 | No | No |
| 17946900 | MALICIOUS HOMOGLYPHIC DOMAIN NAME DETECTION AND ASSOCIATED CYBER SECURITY APPLICATIONS | September 2022 | April 2023 | Allow | 7 | 1 | 0 | Yes | No |
| 17903663 | DETECTION OF UNKNOWN APPLICATIONS | September 2022 | July 2025 | Allow | 35 | 3 | 0 | Yes | No |
| 17802429 | Method and System for Detecting Data Traffic in a Communication Network | August 2022 | August 2024 | Allow | 24 | 5 | 0 | Yes | No |
| 17888422 | EXTENDED BROWSER MONITORING INBOUND CONNECTION REQUESTS FOR AGENTLESS LATERAL MOVEMENT PROTECTION FROM RANSOMWARE FOR ENDPOINTS DEPLOYED UNDER A DEFAULT GATEWAY WITH POINT TO POINT LINKS | August 2022 | April 2023 | Allow | 8 | 1 | 0 | Yes | No |
| 17887389 | DHCP SERVER-BASED STEERING LOGIC FOR POLICY ENFORCEMENT ON IoT DEVICES | August 2022 | August 2023 | Allow | 12 | 2 | 0 | Yes | No |
| 17869902 | System and Method for Fabric-Independent In-Band Privacy for Security Commands on Non-volatile Memory Express Over Fabrics (NVMe-oF) | July 2022 | April 2025 | Allow | 33 | 3 | 0 | Yes | No |
| 17870419 | METHOD AND APPARATUS FOR CREATING A MALWARE DETECTION DATASET | July 2022 | April 2025 | Allow | 33 | 1 | 0 | Yes | No |
| 17870157 | Secure Computerized Device | July 2022 | August 2025 | Abandon | 37 | 1 | 0 | No | No |
| 17867574 | ELECTRONIC TRANSACTION SECURITY SYSTEM AND METHOD | July 2022 | December 2023 | Allow | 17 | 1 | 0 | No | No |
| 17861559 | Systems and methods for monitoring for and lowering the risk of addiction-related or restriction violation-related behavior(s) | July 2022 | May 2025 | Allow | 34 | 1 | 0 | Yes | No |
| 17750640 | Scored threat signature analysis | May 2022 | January 2024 | Allow | 20 | 1 | 0 | Yes | No |
| 17745250 | ARTIFICIAL INTELLIGENCE CYBER SECURITY ANALYST | May 2022 | May 2025 | Allow | 36 | 3 | 0 | No | No |
| 17736507 | MALWARE DETECTOR | May 2022 | October 2023 | Allow | 17 | 1 | 0 | No | No |
| 17661762 | NETWORK NODE IDENTIFICATION USING WIRELESS SIGNAL SIGNATURES | May 2022 | July 2024 | Allow | 27 | 1 | 0 | No | No |
| 17732358 | ROGUE DEVICE DETECTION INCLUDING MAC ADDRESS SPOOFING DETECTION | April 2022 | March 2024 | Allow | 22 | 2 | 0 | Yes | No |
| 17722251 | ROUTE HIJACK MITIGATION | April 2022 | August 2025 | Allow | 40 | 2 | 0 | No | No |
| 17707088 | AUTOMATED AND CONTINUOUS CYBERSECURITY ASSESSMENT WITH MEASUREMENT AND SCORING | March 2022 | March 2024 | Abandon | 23 | 2 | 0 | No | No |
| 17703957 | ENHANCING NETWORK SECURITY | March 2022 | July 2023 | Allow | 16 | 2 | 0 | Yes | No |
| 17703964 | ENHANCING NETWORK SECURITY | March 2022 | October 2023 | Allow | 19 | 2 | 0 | Yes | No |
| 17703959 | ENHANCING NETWORK SECURITY | March 2022 | October 2023 | Allow | 19 | 2 | 0 | Yes | No |
| 17656005 | WORKFLOW PENETRATION TESTING | March 2022 | January 2026 | Allow | 46 | 3 | 0 | Yes | No |
| 17762738 | SYSTEMS AND METHODS FOR NETWORK CHANGES TO A COMPUTERIZED NETWORK | March 2022 | June 2025 | Abandon | 38 | 2 | 0 | Yes | No |
| 17701654 | ENHANCING NETWORK SECURITY | March 2022 | May 2023 | Allow | 14 | 3 | 0 | Yes | No |
| 17690638 | CENTRALIZED PLATFORM FOR PERFORMING PRE-TRANSMISSION DATA TRANSFORMATIONS | March 2022 | February 2026 | Abandon | 47 | 4 | 0 | No | No |
| 17690456 | LATERAL MOVEMENT FACILITATION OF MALICIOUS ATTACKS USING HONEYPOTS | March 2022 | September 2024 | Allow | 30 | 4 | 0 | No | No |
| 17684585 | AUTHENTICATING A DEVICE IN A COMMUNICATION NETWORK OF AN AUTOMATION INSTALLATION | March 2022 | November 2025 | Allow | 44 | 3 | 0 | No | No |
| 17584671 | SECURE SERVER CLIENT INTERACTION | January 2022 | December 2024 | Allow | 53 | 2 | 0 | Yes | No |
| 17572564 | SYSTEM AND METHOD FOR DATA ACCESS FROM AN AIRCRAFT | January 2022 | November 2024 | Abandon | 34 | 2 | 0 | No | No |
| 17567388 | SECURE COMPUTING HARDWARE APPARATUS | January 2022 | July 2023 | Allow | 18 | 3 | 0 | Yes | No |
| 17560036 | REAL TIME DYNAMIC CLIENT ACCESS CONTROL | December 2021 | May 2024 | Allow | 29 | 2 | 0 | Yes | No |
| 17517371 | User Responses to Cyber Security Threats | November 2021 | January 2023 | Allow | 15 | 1 | 0 | No | No |
| 17516063 | MODIFYING TRIAGE INFORMATION BASED ON NETWORK MONITORING | November 2021 | January 2025 | Allow | 39 | 6 | 0 | Yes | No |
| 17508888 | APPARATUS AND METHOD FOR COMMUNICATING DATA IN IN-VEHICLE NETWORK BASED ON AUTOMOTIVE ETHERNET | October 2021 | August 2024 | Abandon | 33 | 1 | 0 | No | No |
| 17507988 | SYSTEM FOR PERSONAL AUTHENTICATION AND WEBSITE LOGIN USING USB | October 2021 | May 2024 | Abandon | 31 | 1 | 0 | No | No |
| 17501029 | APPARATUS AND METHODS FOR SECURE, DISTRIBUTED, AUGMENTED-REALITY (AR) COMMUNICATION SYSTEMS | October 2021 | March 2024 | Allow | 29 | 2 | 0 | Yes | No |
| 17474606 | REAL-TIME FRAUD DETECTION IN VOICE BIOMETRIC SYSTEMS USING REPETITIVE PHRASES IN FRAUDSTER VOICE PRINTS | September 2021 | May 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17461546 | METHODS AND SYSTEMS FOR AUTOMATING CYBERSECURITY REVIEWS OF IT SYSTEMS, IT ASSETS, AND THEIR OPERATING ENVIRONMENTS | August 2021 | April 2024 | Abandon | 31 | 1 | 0 | No | No |
| 17409436 | AUTOMATED AND CONTINUOUS CYBERSECURITY ASSESSMENT WITH MEASUREMENT AND SCORING | August 2021 | February 2022 | Allow | 6 | 1 | 0 | No | No |
| 17403996 | Authorization-Based Behaviometric Identification | August 2021 | March 2022 | Allow | 7 | 1 | 0 | No | No |
| 17370712 | Automated Prediction Of Cybersecurity Vulnerabilities | July 2021 | October 2025 | Allow | 52 | 5 | 0 | Yes | No |
| 17351569 | PRIVACY PRESERVING ENSEMBLE LEARNING AS A SERVICE | June 2021 | August 2024 | Allow | 38 | 2 | 0 | No | No |
| 17347777 | SYSTEMS AND METHODS FOR NETWORK RISK MANAGEMENT, CYBER RISK MANAGEMENT, SECURITY RATINGS, AND EVALUATION SYSTEMS AND METHODS OF THE SAME | June 2021 | February 2024 | Allow | 32 | 1 | 0 | Yes | No |
| 17342451 | SOFTWARE PROVENANCE VALIDATION | June 2021 | August 2024 | Allow | 39 | 1 | 0 | No | No |
| 17323853 | SOFTWARE AS A SERVICE (SaaS) USER INTERFACE (UI) FOR DISPLAYING USER ACTIVITIES IN AN ARTIFICIAL INTELLIGENCE (AI)-BASED CYBER THREAT DEFENSE SYSTEM | May 2021 | November 2025 | Allow | 54 | 3 | 0 | No | No |
| 17319406 | HOLISTIC ASSESSMENT, MONITORING, AND MANAGEMENT OF DIGITAL PRESENCE | May 2021 | December 2023 | Allow | 31 | 2 | 0 | Yes | No |
| 17245991 | Anchor Key Generation Method, Device, and System | April 2021 | October 2023 | Allow | 30 | 2 | 0 | Yes | No |
| 17244225 | NETWORK ATTACK DEFENSE METHOD, APPARATUS, DEVICE, SYSTEM AND STORAGE MEDIUM | April 2021 | August 2024 | Abandon | 40 | 1 | 0 | No | No |
| 17286584 | PROTECTED PERIPHERAL PORTS | April 2021 | November 2024 | Allow | 43 | 3 | 0 | Yes | No |
| 17231366 | DISTRIBUTED ROUTING AND LOAD BALANCING IN A DYNAMIC SERVICE CHAIN | April 2021 | August 2023 | Allow | 28 | 2 | 0 | Yes | No |
| 17227927 | SYSTEM AND METHOD FOR SIGNATURE PATHWAY AUTHENTICATION AND IDENTIFICATION | April 2021 | February 2023 | Abandon | 22 | 2 | 0 | No | No |
| 17201762 | SYSTEMS AND METHODS FOR ASSESSING SOFTWARE VULNERABILITIES THROUGH A COMBINATION OF EXTERNAL THREAT INTELLIGENCE AND INTERNAL ENTERPRISE INFORMATION TECHNOLOGY DATA | March 2021 | August 2022 | Abandon | 17 | 0 | 0 | No | No |
| 17275870 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM | March 2021 | August 2024 | Allow | 41 | 3 | 0 | Yes | No |
| 17196048 | DATA PROVIDING SERVER DEVICE AND DATA PROVIDING METHOD | March 2021 | April 2025 | Abandon | 49 | 2 | 0 | No | No |
| 17187169 | CYBER SECURITY FOR SOFTWARE-AS-A-SERVICE FACTORING RISK | February 2021 | February 2026 | Allow | 60 | 4 | 0 | No | No |
| 17184001 | COLLABORATIVE COMMUNICATIONS ENVIRONMENT AND PRIVACY SETTING ASSOCIATED THEREWITH | February 2021 | December 2023 | Allow | 34 | 4 | 0 | Yes | No |
| 17162715 | SECURITY CONTEXT HANDLING IN 5G DURING HANDOVER | January 2021 | April 2021 | Allow | 2 | 1 | 0 | No | No |
| 17149862 | ARTIFICIAL INTELLIGENCE CORROBORATION OF VENDOR OUTPUTS | January 2021 | August 2024 | Allow | 43 | 3 | 0 | Yes | No |
| 17253547 | SYSTEM FOR TECHNOLOGY INFRASTRUCTURE ANALYSIS | December 2020 | October 2023 | Abandon | 34 | 1 | 0 | No | No |
| 17121971 | IDENTITY MANAGEMENT SERVICE USING A BLOCKCHAIN PROVIDING CERTIFYING TRANSACTIONS BETWEEN DEVICES | December 2020 | October 2023 | Abandon | 34 | 2 | 0 | No | No |
| 17122765 | REAL TIME APPLICATION PROTECTION SYSTEM ATTACK MONITORING AND PATCHING | December 2020 | June 2024 | Abandon | 42 | 4 | 0 | Yes | No |
| 17103963 | DYNAMICALLY ANALYZING THIRD-PARTY APPLICATION WEBSITE CERTIFICATES ACROSS USERS TO DETECT MALICIOUS ACTIVITY | November 2020 | October 2023 | Abandon | 35 | 2 | 0 | No | No |
This analysis examines appeal outcomes and the strategic value of filing appeals for examiner BROWN, CHRISTOPHER J.
With a 20.5% reversal rate, the PTAB affirms the examiner's rejections in the vast majority of cases. This reversal rate is below the USPTO average, indicating that appeals face more challenges here than typical.
Filing a Notice of Appeal can sometimes lead to allowance even before the appeal is fully briefed or decided by the PTAB. This occurs when the examiner or their supervisor reconsiders the rejection during the mandatory appeal conference (MPEP § 1207.01) after the appeal is filed.
In this dataset, 31.2% of applications that filed an appeal were subsequently allowed. This appeal filing benefit rate is below the USPTO average, suggesting that filing an appeal has limited effectiveness in prompting favorable reconsideration.
⚠ Appeals to PTAB face challenges. Ensure your case has strong merit before committing to full Board review.
⚠ Filing a Notice of Appeal shows limited benefit. Consider other strategies like interviews or amendments before appealing.
Examiner BROWN, CHRISTOPHER J works in Art Unit 2439 and has examined 653 patent applications in our dataset. With an allowance rate of 75.7%, this examiner has a below-average tendency to allow applications. Applications typically reach final disposition in approximately 37 months.
Examiner BROWN, CHRISTOPHER J's allowance rate of 75.7% places them in the 41% percentile among all USPTO examiners. This examiner has a below-average tendency to allow applications.
On average, applications examined by BROWN, CHRISTOPHER J receive 2.66 office actions before reaching final disposition. This places the examiner in the 78% percentile for office actions issued. This examiner issues more office actions than most examiners, which may indicate thorough examination or difficulty in reaching agreement with applicants.
The median time to disposition (half-life) for applications examined by BROWN, CHRISTOPHER J is 37 months. This places the examiner in the 33% percentile for prosecution speed. Prosecution timelines are slightly slower than average with this examiner.
Conducting an examiner interview provides a +9.5% benefit to allowance rate for applications examined by BROWN, CHRISTOPHER J. This interview benefit is in the 42% percentile among all examiners. Recommendation: Interviews provide a below-average benefit with this examiner.
When applicants file an RCE with this examiner, 26.2% of applications are subsequently allowed. This success rate is in the 43% percentile among all examiners. Strategic Insight: RCEs show below-average effectiveness with this examiner. Carefully evaluate whether an RCE or continuation is the better strategy.
This examiner enters after-final amendments leading to allowance in 26.7% of cases where such amendments are filed. This entry rate is in the 37% percentile among all examiners. Strategic Recommendation: This examiner shows below-average receptiveness to after-final amendments. You may need to file an RCE or appeal rather than relying on after-final amendment entry.
When applicants request a pre-appeal conference (PAC) with this examiner, 58.1% result in withdrawal of the rejection or reopening of prosecution. This success rate is in the 49% percentile among all examiners. Note: Pre-appeal conferences show below-average success with this examiner. Consider whether your arguments are strong enough to warrant a PAC request.
This examiner withdraws rejections or reopens prosecution in 56.2% of appeals filed. This is in the 28% percentile among all examiners. Of these withdrawals, 30.0% occur early in the appeal process (after Notice of Appeal but before Appeal Brief). Strategic Insight: This examiner shows below-average willingness to reconsider rejections during appeals. Be prepared to fully prosecute appeals if filed.
When applicants file petitions regarding this examiner's actions, 45.6% are granted (fully or in part). This grant rate is in the 39% percentile among all examiners. Strategic Note: Petitions show below-average success regarding this examiner's actions. Ensure you have a strong procedural basis before filing.
Examiner's Amendments: This examiner makes examiner's amendments in 3.5% of allowed cases (in the 81% percentile). Per MPEP § 1302.04, examiner's amendments are used to place applications in condition for allowance when only minor changes are needed. This examiner frequently uses this tool compared to other examiners, indicating a cooperative approach to getting applications allowed. Strategic Insight: If you are close to allowance but minor claim amendments are needed, this examiner may be willing to make an examiner's amendment rather than requiring another round of prosecution.
Quayle Actions: This examiner issues Ex Parte Quayle actions in 0.0% of allowed cases (in the 18% percentile). This examiner rarely issues Quayle actions compared to other examiners. Allowances typically come directly without a separate action for formal matters.
Based on the statistical analysis of this examiner's prosecution patterns, here are tailored strategic recommendations:
Not Legal Advice: The information provided in this report is for informational purposes only and does not constitute legal advice. You should consult with a qualified patent attorney or agent for advice specific to your situation.
No Guarantees: We do not provide any guarantees as to the accuracy, completeness, or timeliness of the statistics presented above. Patent prosecution statistics are derived from publicly available USPTO data and are subject to data quality limitations, processing errors, and changes in USPTO practices over time.
Limitation of Liability: Under no circumstances will IronCrow AI be liable for any outcome, decision, or action resulting from your reliance on the statistics, analysis, or recommendations presented in this report. Past prosecution patterns do not guarantee future results.
Use at Your Own Risk: While we strive to provide accurate and useful prosecution statistics, you should independently verify any information that is material to your prosecution strategy and use your professional judgment in all patent prosecution matters.